Crypto Valuation Report v20181016 FV
Crypto Valuation Report v20181016 FV
Crypto Valuation Report v20181016 FV
ACKNOWLEDGMENTS
We would like to thank Anuj Das Gupta (Chief Research Officer at Stratumn) and
Hubert Ritzdorf (CTO at ChainSecurity) for their valuable technical inputs regarding
Smart Contracts. Special mention also goes to Stefan Leins, the author of ‘Stories of
Capitalism: Inside the Role of Financial Analysts’, for his valuable contribution on how
securities are analysed today, and to the team at Autonomous NEXT for providing data
and images from their Crypto Utopia report, which have been republished in this
document.
www.linkedin.com/in/karybheemaiah/
Alexis Collomb: Alexis is Professor of Finance at Cnam, Paris, where he also heads
the economics, finance and insurance department. He is a scientific co-director of the
Blockchain Perspectives Joint Research Initiative (BPJRI). As a fintech and insurtech
devotee, he writes and lectures regularly on blockchain technology and cryptoassets.
He is also a scientific adviser of PSL/Mines ParisTech’s IHEIE, a leading international
program focused on innovation and entrepreneurship and of Labex Refi, a think tank
dedicated to financial regulation.
www.linkedin.com/in/ alexis-collomb-b2154336/
FOREWORD
It is quite clear that if we look at what has been happening in the ICO space over the
last two years, there has been a mix of great, good, bad, and sometimes very ugly...
In general, valuing crypto-assets is a complex issue. While many different token
classifications have been provided, they all seem to have one common denominator :
tokens are usually hybrid objects with various features—utility, security, etc. Hence
valuing them properly is hard on at least three grounds : firstly, the projects these
tokens support are more often than not very ‘early stage’ ; secondly, understanding
exactly how these hybrid objects will create value, and the non-linearities in the
process, is a difficult exercise ; thirdly, correctly anticipating how their overall
ecosystem will unfold adds an additional degree of complexity. If it is already hard
enough to properly estimate the share value of a ‘traditional’ product-oriented
startup at the seed funding stage, it is easy to figure out that valuing ICO tokens is
even harder. As for traditional startups, many analysts will take shortcuts and focus
on one or two key aspects such as the whitepaper or the team.
To take up this challenge and help us structure our thinking around these questions,
we have asked Kary Bheemaiah to look into this issue of how to properly value
crypto-assets… Could we come up with a universal model to price ICO tokens ? Could
we operate—as is usually done in the financial sphere—by either building discounted
cash flows models or using ‘comparable analysis’ ? How should we organize the
different value components and prioritize them ?
Those who have entered the fray of tokenomics will know how complex these issues
can be and by no means, this report claims to have found the answers. As its first
version is about to be published, it seems that the— irrational, many would say—
exuberance that has fueled the ICO trend—especially at the end of 2017 and
beginning of 2018—has been abating. As expectations are adjusting and the overall
market is maturing, we hope this report will be helpful in helping entrepreneurs,
investors, and researchers alike, to identify the variables and value drivers that
matter—a first stepping stone not to be missed.
Alexis Collomb
Scientific co-director
Blockchain Perspectives Joint Research Initiative
TABLE OF CONTENTS
Executive Summary 6
7
Introduction
12
PART 1: Current State of Token Valuation
Conclusion 55
Appendices 56
Appendix 1 56
Appendix 2 57
58
Appendix 3
Bibliography 61
EXECUTIVE SUMMARY
Since the launch of Token Sales or ICOs about the Bias-Variance Trade-off
in the past few years, the notion of which states that complex models tend
developing valuation methodologies to be overfitted, i.e.: they work well on
that can accurately ascertain the future past datasets but poorly on future
of a token’s price has become a subject datasets. This last issue comes back full
of increasing debate, with some experts circle to the first problem of lack of
attempting to retrofit stock valuation empirical evidence and can cause
models in the hope of creating accurate spurious correlations. As a result of
token price prediction models. these issues, investors wanting to
deploy capital in token projects are at a
While these efforts are laudable, and loss as there is no reference framework.
necessary, they suffer from a few flaws:
Firstly, there is a lack of empirical The purpose of this report is therefore
analysis – making any kind of prediction to start at the basics, or more precisely,
model requires rigorous empirical the variables. Having conducted
evidence. As the token market is still extensive research we provide the
nascent we currently lack the necessary reader with a list of variables that need
data to test these models. This issue is to be considered when analysing a
further compounded by the fact that token project. Readers of this report
there is a significant degree of diversity who are interested in developing a
in the token space (work tokens, utility valuation methodology must realise
tokens, asset-backed tokens, etc.). that there is currently no universal
token valuation method. Instead they
This leads us to the second problem, need to follow a modular approach in
which is a lack of consistency in the type which key variables and analysis
of data being used – how are the fields methods need to be selected based on
defined?, where is the data coming the kind of token or cryptocurrency they
from? As tokens have currency-like are interested in evaluating. Thus, our
properties along with functional goal is to provide the variables that
objectives, a clear definition of the type need to be taken into consideration. We
of data being used is crucial to are cognizant of the fact that to truly
developing sensible valuation models. develop a valuation method, we require
to determine the adoption curve of the
Thirdly, there is a large amount of
business model behind a token sale. As
assumptions being made, the key one
most of the ICOs are still in a phase of
being that a model or a formula that is
development, we currently lack the
used for stock valuation can be applied
data necessary to build such a model.
to a new asset class which has very
But by reviewing the models being used
different properties. Very few of the
and by identifying the variables that are
token valuation models being built are
key to understanding the feasibility of a
able to explain the assumptions behind
token project, it is our goal to set the
the formulas being used before applying
stage for building token valuation
them to new situations. Finally, there
methodologies and frameworks in the
are the issues of overfitting and model
future.
complexity – data scientists often talk
INTRODUCTION
Since mid 2016, the subject of token reviews, growth expectations, term
sales/ICOs has become an increasingly sheet proposal, etc.
discussed topic with varying views.
Some regard the rise of this new VCs would then decide on which
investment model as the future of projects were worthy of investing in,
crowdfunding, while others have and it was common to hear stories of
branded it as a vehicle of scam. entrepreneurs being rejected multiple
times before gaining a first round of
The reason for this level of interest funding.
stems from the fact that over the past
two years, the amount of investment But with the rise of ICOs, this process
generated from this investment vehicle has been significantly altered. Based on
has grown at a phenomenal rate all the publication of a white paper (which
across the globe. Few investment is essentially an extensive business
vehicles have been able to generate proposal that includes specifications of
similar amounts of capital raise in such a to-be constructed product or service),
limited time periods (See Figure 1). and by leveraging the hype of the
Blockchain, a number of entrepreneurs
Prior to the launch of ICOs, most have been able to access considerable
entrepreneurs had to follow a laborious sums of funding via token sales.
process to acquire funding – approach
Venture Capitalists (VCs) or similar The sums being raised are quite
investors, and present a project with significant as well. As per recent market
multiple supports - such as a well- statistics, approximately $5.6 billion
defined marketing strategy, a realistic was raised via ICOs in 2017, and by the
yet ambitious business plan, a first quarter of 2018, that sum was
prototype of a product or service already surpassed. Some
offering, summarized test-group approximations state that $12 billion
have been raised since the beginning of
2017. Figure 1 offers some insight.
Figure 1 : ICO Funding versus VC and CVC Funding
next.autonomous.com
Source: Crypto Utopia, Autonomous NEXT, 2018. Image republished with permission.
Key Figures1:
Project Raise
Tezos $230,498,884
Filecoin $200,000,000
Polkadot $144,347,146
QASH $108,174,500
Status $107,664,904
Kin $98,500,326
COSMA $95,614,242
TenX $83,110,818
Total $1,378,796,646
10
11
OBJECTIVES
In light of these fast paced changes, the creating a new crowdfunding model,
first objective of this report is to provide testing a valuation model requires
the reader with an understanding of empirical evidence.
how investors are currently analysing
ICOs prior to allocating their capital. As of today, most of the funds received
by token issuers are being used to build
While equity investing has established the actual product or service they
models and standards, the same cannot described in their whitepapers.
be said for token investing. As a result,
a number of investors have tried Without sufficient data regarding the
retrofitting stock evaluation models in adoption cycle of their products, the
order to attempt to create token switching costs that users will have to
valuation models. bear when switching from an App to a
Dapp, the multi-modal nature of tokens
While these approaches are laudable, (tokens bear currency-like aspects that
we show that owing to the networked are not seen in stocks) and the
nature and diversity of tokens, such changing regulatory environment,
models have limited applicability. Thus, building a generalistic evaluation model
a secondary objective of this report is to would be erroneous today.
show what needs to be taken into
consideration by investors who want to Our main objective is therefore to
create token valuation models. provide some guidelines of what needs
to considered when such an attempt is
It must also be remembered, that while made in the future.
token sales show promise, in terms of
12
While the process entrepreneurs have earnings, there are very few data points
to follow with traditional capital raising that can be used to estimate the value
is laborious, it serves a purpose. It of the company, let alone determine
helps ensure that a project is viable, what the token price should be.
that a product has worth and the capital
being raised will be used appropriately Moreover, a token does not offer a
over a long period. In exchange the dividend (as a stock does) as the
team benefits from the guidance of an company has not yet generated a cash
experienced investor who apart from flow. Most tokens only offer a right to
providing them with capital, can also the future use of a to-be-constructed
furnish technical, legal or business product, under the assumption that the
guidance to help grow their company. company will not pivot the product once
it has received the funds. Recently the
Rigorous due diligence is conducted as concept of Equity Tokens a subcategory
there is a cost of ownership – when a of security tokens that represent
VC invests in a start-up, they gain ownership of an asset, such as debt or
access to a certain percentage of the company stock has begun to gain some
start-ups shares, i.e.: ownership of the attention, but by and large, most
firm, and any associated liabilities as a tokens offer the right to the future use
consequence. Similarly, by accepting of a to-be-constructed product.
VC capital, the entrepreneur is giving up
part of his/her company and open to the The de facto source of reference used
risks that might affect the investor’s by investors interested in investing in
portfolio. an ICO is the whitepaper. Some token
creators will also publish a technical
This mutual sense of responsibility is paper and in some cases, even some
however partially lost with ICOs. A preliminary bits of code would be
token sale generally does not function available for review which would be
as a share/dividend. Contrary to its analysed by serious investors. But by
namesake, the Initial Public Offering and large, there is no concrete
(IPO), an ICO or Token Sale does not investment framework to determine the
involve the sale of equity in (or voting value of a token.
rights pertaining to) a company per se.
Instead, ICO participants are acquiring Thus, token investors are faced with a
an asset— a “token”—which allows the quandary. On one side, they are dealing
holder to use, or govern, a network that with a technology that is yet to become
the token sellers plan to develop using a formal curriculum subject in most
capital raised via the sale of the token. universities. Nevertheless it holds
As the business behind the token is yet tremendous potential and is considered
to be built and has no assets or by a number of tech pundits as the next
13
internet. The fact that established VCs among others. The market still sets the
are taking this technology seriously price. But by using these evaluation
underlines the impact it could have on models, investors are trying to estimate
the financial industry. what the future price would be based on
a collection of data points that
On the other side, owing to the age of represent concrete elements such as
this technology and its evolving nature, physical assets, existing market share,
there is no formal framework that can IP, product-market fit, existing clientele
aid investors in determining the true population, etc.…
value of a project classified under this
new asset class. This problem is further While these methods allows investors to
compounded by the variety of tokens encapsulate a future anticipated value,
and their built-in functionalities that are they also serve a secondary role of
usually tailored for specific purposes. protecting against runaway market
speculation. When the value of a good
The lack of structure, frameworks and or service is being speculated upon,
regulation means that currently, the often times it is seen that markets can
ICO space is extremely susceptible to go awry creating bubbles and boom
market forces. This statement needs to cycles in the process. Conducting DCF
be further deconstructed in order to and DDM analyses thus allows investors
underline its contemporary significance to determine what a realistic price point
in the context of ICOs. would be for a stock. In the process,
they mitigate against excessive market
History shows us that by and large,
speculation.
markets function as the best price
setting mechanism in distributed, fair, Without tools such as these, the act of
decentralized networks. The actual determining what is a sensible
value of any asset is based on the price investment, and if it fits into your risk
that others are willing to pay for it, and profile, is not feasible and investors
competitive forces in a market allow would be exposed to the full brunt of
different economic agents to set the open market speculation effects. While
price for a product or a service. these evaluation methods are not
perfect, they allow investors to add a
This modus operandi holds true when
certain dose of pragmatism when it
we are dealing with a tangible good or
comes to investing in a to-be-
service that is immediately available.
constructed good or service, or in the
But when it comes to investment,
expected future growth of a company.
agents are forced to compute an
investment price based on its future But when it comes to Token sales, we
anticipated value—usually represented currently do not have a similar control
by its stream of future cash flows. mechanism. As a token is not a stock,
using the same methods of stock
To aid in this future determination, we
evaluation does not offer the same
use a plethora of tools to aid in our
amount of certitude. As we currently do
investment decisions. For example
not have a proper framework that
when evaluating the future value of a
allows us to determine the value of
stock, we use methods such as
certain attributes of a token sale, this
Discounted Cash Flow (DCF) or
leaves the price of tokens open to
Dividend Discount Models (DDM)
14
This susceptibility to market forces and resulting acceptance of token price volatility
has led to a number of negative effects or practices of questionable utility:
§ Pump and Dump Schemes: (such as Big Pump and Alt-Pump) have
resorted to ‘pump n’ dump’ schemes,
As the regulations around this where a group of individuals get
technology are still being set in place, it together on online forums and decided
offers the chance to engage in market to artificially inflate the demand, and
manipulation activities that would be hence the price of a token. If one were
considered illegal with other asset to spend a few minutes scrolling the
classes. Recently, nefarious actors on cryptocurrency content on Telegram,
certain cryptocurrency communities the encrypted messaging app, they
2
The cryptocurrency volatility index is composed of six currencies: BTC, ETH, XRP, LTC, DASH, and
XMR. The volatility index is weighted by the market capitalization of each currency which is updated
daily by the index creators, Sifrdata. See: https://www.sifrdata.com/cryptocurrency-volatility-index/
15
would soon discover dozens of ‘pump make their platform useable from an
and dump’ scams (Murphy, 2018) (Wall economic standpoint, Telegram decided
Street Journal, 2018). to launch an ICO where investors could
contribute and acquire TON tokens in
Pump and dump schemes (a daily list the process.
can be found on
pumpdump.coincheckup.com) are just While the objectives were aligned with
one example of market manipulation societal issues, nevertheless, the TON
that are rife in this loosely-regulated needed to be protected against
sector. Other practises such as front- volatility. As a result, Telegram decided
running, wash- trading (which involves to keep aside 52% of the capital raised
creating false volume by matching via the token sale in reserve.
trades), and spoofing (where you place
and then quickly cancel orders) are The Telegram ICO aimed to raise $1.2
currently being practised. Unscrupulous Billion in order to create its censorship
agents leverage market forces and proof solutions. 52% of this sum comes
loose regulation to make a quick buck. up to $624 Million, a sizeable sum to
No consideration is given to the say the least. $624 Million that would
business solution or to the problem- not be used in the creation of products,
solving potential of the product behind but kept in reserve and unused. All to
the token. Value creation is scarified at counteract the effects of market
the altar of short get rich quick schemes speculation and the actions of nefarious
(Financial Stability Board, 2018) . In the actors.
words of Asaf Meir, the founder of
It is therefore essential that going
Solidus Labs, which develops market
forward, a solution needs to be found
surveillance tools specifically for crypto
that will allow both token creators and
markets, “[The market] is highly,
token investors with a more efficient
highly, highly manipulated. The extent way to allocate capital raised.
is truly humongous” (Murphy, 2018).
§ Airdrops:
§ Inefficient Capital Usage :
In light of the above mentioned issues
Following the risk to volatility and pump
and the regulatory greyness with
and dump schemes, token creators
regards to ICOs in general, a new trend
have been obliged to hedge against the
has emerged in which potential
token’s price volatility by indulging in
investors are given tokens for free in
capital protection techniques. This the form of an airdrop.
normally involves keeping aside a
sizeable portion of the capital raised in The objective of an airdrop is 3-fold:
reserve to counteract against token
volatility. i. Raise popularity of your token by
engaging early adopters of this tech
For example – The Telegram ICO (which to create a network effect. An
was subsequently cancelled) was airdrop functions both as a
launched in early 2018 and aimed to marketing interface and an on
create censorship resistant file storage, boarding experience.
messaging, decentralized apps and
browsing. To fund the development of
these complex consumer solutions and
16
ii. Raise awareness of the token once Another issue with airdrops is the
more people start trading it, thus supply of the tokens (a topic that will be
raising the price (if all goes well). addressed in later parts of the report).
While scarcity of a token is often cited
iii. Use (i) and (ii) to get serious as the means of increasing its value,
investors who would be willing to shortage of a token can create its own
contribute capital to the difficulties.
development of the project.
This was seen most recently with the U
While the concept looks enticing and Network (a blockchain publishing
has had certain benefits especially from protocol valued at around $8 million) ,
a legal standpoint, the ability of which in early July 2018, announced
Airdrops to convert into actual that it had run out of its reserve of UUU
investment requires more research and crypto tokens.
documentation – something that is hard
to find today. At the start of the project, U Network
established a 10 billion UUU cap on its
Furthermore, airdrops are essentially token supply (worth approximately
free token giveaways and offer very $15.6 million). An estimated 8 million
little to token holders. Essentially, worth of tokens was given away in
holders of tokens (received via Airdrops airdrops. But as the project gained
or traded later on an exchange) are traction and number of strategic
holding a security without any rights, partners began to increase, the demand
for UUU tokens exceeded the
The development team behind the designated holdings (Milano, 2018).
Airdrop can sell out the business to
anyone without giving token holders The U Network is now attempting buy
any returns. They are also free to, they back some of the supply it distributed to
can take away any rights they do have, early investors through its airdrop in
or decide that it is better for their February. But as it will be seen in later
business to accept USD or BTC next to parts of this report, the supply of tokens
their own token for payment – all of is a key factor that needs to be taken
which lowers the value of the token or into consideration when coming up with
makes it worthless. a valuation model for a token sale.
1.1.1 What does this mean for the future of this investment vehicle?
17
18
One of the first people to address this One of the repeating themes in the work
need was Benjamin Graham. In 1934, of Graham, was the separation between
Graham published the book, Security Intrinsic and Speculative value of a
Analysis, which offered the first formal security. Intrinsic value, as defined in
approach to determine the intrinsic Security Analysis, is
value of a stock. It is this work that led
19
The reason for reviewing the core Secondly a token is used to create,
tenets of financial analysis is because it generate and stimulate value. As it is a
is exactly this bedrock that is missing unit of account and a means of
with token evaluation. In later parts of exchange, a token functioning in a
this report we will review the work done looped and interconnected network
by various entrepreneurs and such as a Blockchain, is also an
researchers who are exploring this Endogenous Monetary system with its
subject with respect to tokens. We will own supply, demand and liquidity
see that while most of these efforts issues Thus, when looking at a
have been made in order to determine tokenized economic system, evaluators
some way to evaluate the value of a need to refer monetary policy aspects
token, most of these efforts have of this networked economy as well the
limited usability as they essentially try underlying business behind it.
to retrofit stock evaluation methods to
create a token valuation method. This aspect of supply is also intimately
linked to the technical aspects of the
But a token is not a stock. While stocks token. The governance of tokenised
share a common framework the same assets or cyptoassets is done by smart
cannot be said for tokens. Not only does contracts. Hence any changes in supply
do tokens not share the same economic – including transfer or lock up plans –
artefacts of a stock, but by themselves need to be hard coded into the smart
tokens are rather unique entities. contract. This makes the governance of
tokens both an economic and technical
Firstly, a token has similar properties to issue simultaneously.
a currency. A token functions not just
as a fund raising mechanism or a utility Lastly, there is the question of variety.
instrument for a new product. It also Today, there are many different types
functions as a means of exchange and of tokens - we have security tokens,
as a unit of account to a certain extent. work tokens, network value tokens,
Thus it shares at least two, if not all asset tokens, utility tokens, payment
three, attributes of a currency (Store of tokens and so on… Figure 5 shows us
Value, Unit of Account and a Means of the current taxonomy of tokens, which
Transfer), which means that it needs to helps us see how diversified this space
be evaluated as a security and a is (Also see Appendix 2):
currency simultaneously.
20
This variety, along with the supply and and vice versa. This is the first lesson
liquidity issues, complicates the manner an investor needs to digest.
in which we can evaluate tokens. There
can be no one-size-fits-all evaluation The second lesson that the investor
methodology as seen with stocks. needs to learn is the kind of variables
that need to be considered. While stock
As a result, investors or academics who evaluation is largely made up of
are interested in developing a valuation financial variables and ratios, tokens
methodology must realise that they are fully digital entities that exist on a
need to follow a modular approach in networked plane. Thus the kinds of
which key variables and analysis variables that need to be analysed are
methods need to be selected based on not just financial but technical as well,
the kind of token or cryptocurrency they especially when analysing smart
are interested in evaluating. contracts. Retrofitting stock valuation
models therefore hold less gravitas as
If we are to allow this technology and they currently do not incorporate such
this new breed of investing model to kinds of variables. Furthermore, when
flourish, then we have to construct a stock analysts use ratios – such as P/E,
toolkit of evaluation methods, where EV/EBIT, Debt/Capital, Debt/Equity,
each evaluation method allows us to ROA, ROE, etc.. – they analyse data
evaluate certain aspects of the token related to these ratios over extended
sale. The evaluation model of a network periods of time. As the token space is
token will not work for a utility token nascent, similar ratios currently do not
21
exist and any time-series data is over a comes to conducting fundamental and
very short time period. technical analysis of tokens. We will
also explain what we mean by technical
As mentioned, since the variety of analysis, as our definition of technical
tokens is quite widespread, being able analysis does not relate to Chartism.
to evaluate the value of a security token
will be different from evaluating the Hence, the goal of this report is to
value of a utility token. But some provide the key tenet’s of a base
attributes (such as base network value) valuation methodology and introduce
and certain variables will be shared by the concept of a modular token
all tokens which can help us create a valuation approach. As the Blockchain
generalised valuation method to a and cryptoasset space grows, the
certain extent. variety and diversity of products and
services will also grow, making such an
Taking these points into consideration, evaluation model more adjustable to
the remainder of this report is broken the upcoming changes.
down as follows:
Prior to delving further, it is important
Part 1.3: We start with a review of the to highlight that fundamental analysis
current valuation methods being practices that are applied to stock
developed. This provides us with an analysis still apply to tokens. Reviewing
overview of what’s been done and helps the team, the experience they have, a
us ascertain the pertinence of current breakdown of the product/service they
valuation methods and where a model are offering and studying other data
makes sense. points that are today considered normal
practises of due diligence, are classic
Part 2: In this part, we will delve into
analysis techniques that should never
more specific aspects of Token
be forgotten. In this vein, we start by
valuation and introduce the key
looking at what’s already been done.
variables to be considered when it
22
23
One of the first valuation methods that considers that value is based on market
built upon the three functions of money forces and that confidence in a “stable
and stated that a token’s ability to serve coin’’ will automatically translate to a
as a store of value can drive significant stable value.
value to investors.
From the current experience we have,
As per this method, cyptoassets that asset-backed tokens often offer limited
have steady values by design (E.g.: tangible redeeming possibilities (case in
stable coins), or which are expected to point – Venezuela’s Petro). Moreover,
grow in price, make for attractive “store it seems to apply only to asset backed
of value” coins . tokens. Hence, its use is limited both in
scope and technique.
This method is thus mainly reserved to
asset-backed tokens as the valuation However, it could be useful to analysing
process involves determining the total the value of stable coins3 or tokens that
assets attached to a token and dividing are collateralized. This collateralization
it by the number of tokens. can occur in three forms:
3
A stablecoin is a cryptocurrency that is often MakerDAO, Basecoin, TrueUSD, Arccy, Stably,
pegged to a stable asset, like gold or the U.S. BitShares, Sweetbridge, Havven, Augmint,
dollar. This gives it lower volatility and some Fragments, Carbon, Kowala, X8X, Globcoin,
practical usage attributes - Sherman Lee, Stronghold USD, etc.
Forbes, (March 2018). Examples– Tether,
24
This methodology has gained a lot of this approach is that as the native token
ground in the discussion on evaluation of a smart contract platform becomes
methods owing to its connotations to widespread and sufficiently useful, it
considering a token based economy as will emerge as an independent store of
a monetary system. As a result, its value (Samani, 2018).
immediate application has been with
general purpose cryptocurrencies which Drawing from The Monetary Equation of
function as independent monetary Exchange (MV=PQ), which is often
bases, such as – Bitcoin, Bitcoin Cash, referred to as The Quantity Theory of
Zcash, Dash, Monero, Decred, etc.. Money, this modified version looks at
the token based economy as an asset
Some proponents of this methodology that is being exchanged. The table
also state that it can be used when below offers a comparison between the
trying to valuate native tokens of smart original version of the equation’s
contract platforms such as Ethereum, variables and its crypto equivalent
EOS and Dfinity. The reasoning behind (Lannquist, 2018):
25
The method states that velocity is a Thus it is hard to establish the size of
significant driver of token price, and the the asset base, especially when
lower the velocity, the greater token applying it to utility tokens that function
price is via an appreciation of M (size of as proprietary payment currencies such
asset base).. The implication of this as Filecoin, Golem, Civic, Raiden, Basic
method is that tokens with low velocity, Attention Token, etc.…
i.e. those that held (owing to
speculation, asset backed, etc.), will Secondly, and more importantly, the
see prices rise. model is a retrofitted version of an
antiquated equation. Most economist
Prior to going further it would be don’t even use the formula anymore as
essential to note that users of this it requires too many assumptions – for
methodology need to apply it with a example, V is assumed to be a
large pinch of salt, for there are a constant, which is hard to calibrate
number of assumptions needed to make within a functioning economy whose
this method work. natural state is entropic rather than
equilibrium. A number of empirical
Firstly, it is based on having a studies have also shown that the
measurable value of M. If this refers to MV=PQ formula is not supported. Hence
a private Blockchain where all the formula is more of a tautology
quantities held by the networks rather than a method.
participants is declared, this might
work. But the assumption of being able Retrofitting this equation to measure
to calculate M especially. In a public the velocity of exchange of a token
Blockchain, is problematic as holders of continues to prove problematic, as
a token can often store tokens off chain. when velocity changes, the choice to
26
4
TAM analysis, is done to determine the The total market price consists of current utility
current utility value of a cryptoasset. A TAM value and discounted future expectations of
analysis is a top-down approach which begins the cryptoasset network’s key drivers in
with the estimate of the market’s total size and subsequent years.
then ascertains what share of the market the
cryptoasset network could potentially obtain.
27
As it can be seen, this approach also Some adopters of the Crypto J-curve,
involves a number of assumptions. have begun using it as a proxy for
Firstly, DEUV is calculated by using a measuring the different stages in the
modified version of the Discounted life of a cryptoasset. For example the
Cash flow formula that is used to New York based VC investment fund,
analyse stocks. Except a Token is not a Placeholder uses the curve as a means
stock as they usually have no assets, of determining which stage the token
earnings or cash flow. Hence using an sale is in - The whitepaper stage is
adapted version of the NPV (Net where the team works to define and
Present Value) or discounted cash flows implement a “minimum viable
has limited applicability. protocol,” which validates the network’s
functionality. The release stage is when
Secondly, it is based on MV=PQ which a crypto network’s token is first made
as we have seen before, is based on available to the public, and the public
antiquated methods and too many stage when the token begins trading on
assumptions. As velocity is an input exchanges (Monegro & Burniske,
value, the model suffers the same 2018).
drawbacks related to the token velocity
model.
28
29
30
Figure 9: Summary of the current models being used for token valuation
Adjusted DCF
methods
Macroeconomic
Community analysis
related metrics
MV=PQ
31
The role of variable selection and the tokens requires that we update our
associated analysis method is of key jargon and kinds of variables to analyse
importance since tokens can function as prior to making an investment decision.
a currency, a commodity, a security or
as a mutualized asset. Owing to this Prior to providing guidelines and
multi-dimensionality, creating a variables for building a framework to
universal valuation framework is measure the intrinsic value of a token,
complicated. However the methods it is necessary to address the latencies
mentioned in the previous part of this of existing valuation practices. This will
section can be used to evaluate certain help us identify the variables that can
kinds of tokenized physical aid in performing fundamental and
assets/security tokens and utility technical analysis with regards to
tokens. As we have seen from the tokens. It also aids us in coming up
attempts of using stock evaluation with a different comprehension and
models to measure token value, the definition of technical analysis in the
fundamental and technical analysis of context of this new asset class.
32
Source: Head and Shoulders Above the Rest? The Performance of Institutional Portfolio Managers Who Use
Technical Analysis, Smith et al., (2013)
33
5
Anchoring or focalism is a cognitive bias that psychology. Kahneman and Tversky carried
describes the tendency for an individual to rely out multiple experiments, whose conclusions
too heavily on an initial piece of information can be found in the book Thinking, Fast and
offered (known as the "anchor") when making Slow.
decisions. It is one of the most well tested
phenomena in the world of experimental
34
35
the main variables that future model We first start by providing a list of
builders need to consider when building fundamental variables. Even though
a model. Tables 3 and 4 enumerate the token sales are relatively new, we can
fundamental and technical variables still borrow a few lessons from
that need to be taken into fundamental stock analysis techniques.
consideration. Below is a table that explains the main
fundamental variables that need to be
reviewed and the purpose for doing so:
§ First mover?
§ Number of incumbents
and monopolistic players
§ Ease to enter the market
based on product/service
§ Size of market (Billions
offering
USD)
§ Strategic Partnerships
§ Competition –
Market § Are their centralized
incumbents and Crypto
competitors exploring a
§ Ability to create a unique
decentralized solution? If
presence
yes, how many.
§ Attractiveness and Growth
of market
§ Sensitivity to economic
cycles
§ Infrastructure needed to
§ Problem being
deliver the
solved/Solution being
Product product/service
provided
§ Technology Readiness
§ Feasibility of Proposition
level
36
7
Amount being raised needs to be clearly defined and the token sale needs to end on success.
Secondary funding rounds or extension of the ICO after hitting the capital target should be watched
with caution as it be related to corrupt incentives.
8
A number of Token sales will have soft and hard cap targets. Often there is no explanation why an
additional amount of money is needed, if the product can be built with a lesser amount (the sift cap).
Expansion into other areas, vertical or scaling might be the reasons, but the validity needs to be
verified.
37
10
CVSS = Common Vulnerability Scoring System provides a way to capture the principal
characteristics of a vulnerability, and produce a numerical score reflecting its severity, as well as a
textual representation of that score. The numerical score can then be translated into a qualitative
representation (such as low, medium, high, and critical) to help organizations properly assess and
prioritize their vulnerability management processes.
38
39
Compliance with Does the code implement many interfaces and contain a
ERC20 Standard (or lot of logic that goes far beyond the ERC20 standard? If
similar standards) sections are not in accordance with current best practice
recommendations, this should throw up warning signs. As
smart contracts are still in a development phase, they
should be easily understandable.
Compliance with Code A Smart Contracts’ code should correspond (for the most
Style Findings part) to the recommended Code Style. If a Smart Contract
contains any complex duplicate code it can lead to
diverging program logic.
Presence of negated The negated conditions can cause errors if the condition is
conditions complex and must be avoided. Simplification of the code
is the first step in this direction.
Use of modifiers Modifiers are used for recurring checks and their use
should be explicitly specified – For Eg: The use of modifiers
11
Smart Contracts exist on the Ethereum ledger in a complex, hard-to-read machine language known
as byte code. But they are most commonly written in an intuitive programming language called
Solidity. Solidity hides from developers the internal details of the Ethereum Virtual Machine and the
complex machine language that it processes. Before being uploaded to the Blockchain, a program
called a “compiler” is used to translate the Solidity source code into Ethereum byte code.
40
Return Values of Verify that the return values of your functions are always
Functions within the range of the expected values. EG: If a function
is expected to return numbers bigger than ‘0’, it should be
tested to see that if it is being forced with a ‘0’ return, does
it reject that situation or not.
Over and under flows Overflow and Underflow Attacks are similar to the Y2K
problem 12 . An overflow occurs when a number gets
incremented above its maximum value. This can allow a
an attacker to gain more tokens than they actually own or
in worse cases can lead to the breakdown of the entire
system. See the note in the appendix to see how this can
compromise a Smart Contract.
Reentrancy Attack
This attack consists on recursively calling the
(Checks-Effects-
call.value() method in a ERC20 token to extract the
Interactions Pattern)
ether stored on the contract if the user is not updating the
balance of the sender before sending the ether. More
recently, there have been an increasing number of issues
related to this kind of attack with ERC827 tokens13.
Reordering attack
In such an attack, a miner or other party tries to “race”
with a smart contract participant by inserting their own
information into a list or mapping so the attacker may be
lucky in getting their own information stored on the
12
Y2K was a class of computer bugs that was threatening to cause havoc during the turn of the
millennium. To keep it as simple as possible, many programs represented four-digit years with only
the final two digits. So, 1998 was stored as 98 and 1999 as 99. However, this would be problematic
when the year changes to 2000, since the system will save it as 00 and revert back to 1900.
13
ERC827 tokens. is an extension of ERC20. The three functions that are new in ERC827
are: approveAndCall(), transferAndCall(), and transferFromAndCall().
The difference between the ERC827 functions and their ERC20 counterparts is that in addition to what
they do in ERC20, they also call_to.call(_data) on the _to contract to whom the money is being
sent. allowing the attacker to buy as many tokens as he wants, bypassing the individual sales cap.
41
Short address attack If the token contract has enough quantity of tokens and
the buy function doesn’t check the length of the address
of the sender, the Ethereum’s virtual machine will just add
zeroes to the transaction until the address is complete
(See example in the footnote14). This allows an attacker to
gain more tokens than they own.
NOTE: This is a bug of the Ethereum virtual machine.
Hence, when investing in tokens/purchasing tokens it is
important to check the length of the address.
14
A user creates an Ethereum wallet with a trailing 0,
Eg: 0xiofa8d97756as7df5sd8f75g8675ds8gsdg0
He/she then buys tokens by removing the last zero and affecting the command:
The virtual machine will return 256000 for each 1000 tokens bought. This is a bug of the virtual
machine that’s yet not fixed so when investing in tokens/purchasing tokens it is important to check
the length of the address.
42
NOTE: Green arrows represent individuals joining the ecosystem while Red arrows represent
individuals leaving the ecosystem.
Source: Modelling Open Source Software Communities. Also refer “Methodologies for measuring
project health” (Eghbal, 2018)
43
Firstly, Smart Contracts are neither This ensures that none less than the
Contracts in the actual sense and their majority of computing members own or
“smartness” is debatable. control the execution of a code running
on it. Neither the developers of the
Secondly, since these contracts manage contract codebase nor the parties of the
the supply and governance of the contract (buyers and sellers) will be
tokens, a gap between what the Token able to influence the contract execution
Sale promises and what their code to their advantage (Das Gupta, 2018)
delivers significantly impacts the
investment decision. To say that smart contracts introduce
self-executing programs to Blockchains
There is nothing specific that smart is therefore false, as the opposite is the
contracts bring to Blockchains. Rather it truth. At best, Smart Contracts can be
is the opposite — Blockchains provide defined as bits of code that interact with
objective code execution infrastructures the underlying Blockchain ledger to
as code is executed in Blockchains only govern the transmission of
if it is approved by a majority of Cryptoassets between counterparties.
computing nodes that it follows the Calling them contracts can even be
protocol (Refer the note “Anatomy of a considered misleading.
Smart Contract” in Appendix 3 to
understand the key components of a The table below showcases our current
smart contract and the link between a misconceptions about Smart Contracts
Blockchain and the different elements and sets the stage for the next level of
of a smart contract). analysis with regards to these
automated control mechanisms.
44
Law over Code is Law Code is blind, so is Code is like the codified
Code Law laws of physics, not the
laws of contracts
Source: Smart Contracts: Fulfilling Nakamoto's Dreams (Das Gupta, 2018). Table republished with
permission from the author.
45
Unrestricted write to Contract fields that can be modified by any user must
storage be inspected.
46
47
future cash flows, then a token’s price § Security risk: It requires the key
should reflect an equilibrium between holder(s) to secure the private key. An
token demand (driven by the present attacker (i.e., a disgruntled employee
value of expected future exchange - A number of Token hacks turn out to
options within the token’s native be inside jobs) could hold the network
ecosystem) and token supply (driven hostage and demand a ransom by
by the token’s monetary policy) . freezing transfers, or short the token
Moreover, this blatant belief in “code is which is sure to drop in value.
law” hinges on the belief that the way
the Smart Contract (the governing This tendency of not disclosing in plain
structure in a Token Sale) is coded will terms that the issuers of the token sale
ensure Trustless Trust. have the power to modify the token
rights is probably one of the biggest
However as we have seen, the current limitations with smart contract based
situation regarding trustless trust in token sales. As of the time of publishing
Smart Contracts is far from optimal. this report, it can be stated that ICO
Furthermore, a review of the 50 top code and ICO contracts rarely match .
grossing ICO’s revealed that a In a report titled, ‘Coin-Operated
significant fraction of issuers retained Capitalism’, researchers from the
centralized control… “and did not University of Pennsylvania explored this
disclose code that permitted the discrepancy was found that many ICO’s
modification of the entities governing failed even to promise that they would
structures” (Cohney egt al., 2018). And protect investors against insider self-
while many think of Ethereum contracts dealing and fewer manifested such
as fully decentralized, nearly half of the contracts in code. The text below
top 20 projects15 can have their token summarizes some of their findings with
transfers completely frozen by an regards to token supply and code in
owner (a single key or a multisig smart contracts (Refer “Anatomy of a
contract) (Que, 2018) . This process Smart Contract” in Appendix 3 in case
known as Pausing can be valuable for you wish to familiarize yourself with
future upgrades, swaps, and disaster some of the basic functions of smart
mitigation. But it also leads to new contracts).
risks:
The researchers obtained a copy of the
§ Trust: It requires all users to trust the Solidity code from etherscan.io 16 or
party in charge of the key, reducing GitHub for the fifty top grossing ICOs.
the degree of decentralization in the Each function of the smart contract was
contract. We will cover how to manually tracked to see how each line
measure level of decentralization in modified the meaning of, or data stored
the next specific technical variable. in, the smart contract
15 16
These include: EOS, Tron, Icon, OmiseGo, Etherscan.io replicates the byte code present
Augur, Status, Aelf, and Qash on the blockchain, but requires developers to
upload Solidity source code for display
48
Figure 12: Smart Contracts with encoded supply limits (47 of top 50 ICOs)
49
Figure 12: Smart Contracts with encoded Burning rules (47 of top 50 ICOs)
50
Figure 13: Smart Contracts with encoded Vesting rules (47 of top 50 ICOs)
Figure 14: Smart Contracts with encoded Modifiability rules (47 of top 50
ICOs)
51
52
53
Our final technical variable is the size of Like a physical coin, a cryptoasset is
the network. The reason for paying scarce, and its ownership is
special emphasis on this variable stems transmittable. But while physical coins
from the fact that there exists a large are transmitted from hand-to-hand (or
amount of empirical evidence that hand-to machine), changes in control of
establishes the relationship between cryptoassets occur through the
Network size and Network Value networks that host them.
(Metcalfe, 2013) (Zhang et al., 2015).
This is especially pertinent for Utility Cryptoassets with a utility function
therefore resemble micro-economies,
tokens which make up a significant
as the token can be seen as another
portion of ICOs. currency used in the economy that
specializes in the exchange of a
While the previous attempts at valuing particular service. Token sales thus
utility tokens have made important enable the creation of private
contribution to this new asset class, transactional economies (Mougayar,
more focus needs to be given to the 2017) and as stated by Primoz Kordez,
activity of the network, represented by co-founder of D2 Capital,
the velocity of token’s exchange.
54
this occurs, we would estimate the from the most valuable to the least,
value of the token, based on the weighting the links by their inverse rank
estimation of the value of the service. would yield an average number of
The latter has value only if made connection of log(N) for each node and
accessible. Thus, connections are therefore Nlog(N) connections in total.
paramount for making this estimation The latter representation of a network
as tokens are network native entities. If is often referred as the Zipf’s law.
each participant using the service can
also offer it to others, its value will be Both these network models are extreme
tightly linked to the number of scenarios. If we are to adhere to
participants and their interactions. Metcalfe’s Law, each new participant in
the network instantly connects with all
Using this approach, one could model other nodes. If we are to adhere to
the value of a token in the following Zipf’s law, the average number of
way: connections per node grows
logarithmically, which means that the
(The value of the service) * (The increase in connectivity for an
accessibility of the service) additional participant in the network is
the least positive one.
where accessibility is a function of the
network of participants in the Depending on the maturity of the
blockchain. network, its average number of
connections per node can thus be
Thus, valuating a token based on its
modelized as a function of the number
velocity requires us to evaluate the
network and the service being provided. of participants as Na where the scale
There are various methods that are factor a would lie between 0 and 1. The
currently used for valuating services. To total number of connections in the
conclude our explanation regarding this Network will therefore be of the order
technical variable, we offer some 1+a : N1+a.
insight on estimating the value of a
network. Hence, estimating the connectivity of
the network would come down to
Network Valuation: estimating the exponent of the average
network connections, N1+a, to match
A network is a connected graph with the market capitalization evolution
nodes linked to others via the network. (using transactions a proxy) to a
If a network were to be completely function of the number of market
linked, such that each node is participants (i.e. the N nodes).
connected directly to all others, as per
Metcalfe’s Law, for N nodes, there NOTE: A few papers published in 2017
would be N(N+1)/2 links. (e.g.: See Alabi, 2017) have analysed
historical BTC data to come up with an
Nevertheless, in any network, all links exponent estimation of approximately
do not share equal importance. N1.5. However, these results are
Therefore, to take this into account we pertinent to cryptocurrency networks
would need to give each connection a and the same estimations cannot be
weight to reflect its importance. transposed to tokens owing to their
multi-functionality. We conclude by
For instance, a fully connected network stating that while these methods offer
would have N(N+1)/2 links of equal insight, without empirical data, it would
importance, in a hierarchical network be hard to come up with an token value
where each node is connected to all estimation model based on this
others but with an importance ranking approach.
55
CONCLUSION
As we have seen in this report, the exchange mechanisms, they can act as
current situation regarding token accounting units in the creation of
valuation models is a situation that is economic systems. As we have seen,
clearly in need of greater study and the supply of tokens and the
testing. Moving forward we see three governance of their circulation is a key
topics that need to be explored. element when evaluating a project.
Thus moving forward, advances from
First, there is the subject of the endogenous monetary systems need to
adoption curve. While the promises and be integrated into token valuation
ideas stated in whitepapers are models to respect their fundamental
ambitious and pioneering in some nature. Insights from monetary theory
cases, history has shown us that and monetary and fiscal policy should
building an innovative new product or play an increasingly important role in
service that resolves a problem does the token valuation methods of the
not always translate to large scale future.
adoption. Indeed, even applications
such as WhatsApp, Facebook and Lastly, the variety of tokens and their
Telegram had to wait for three years on multi-functionality needs to be given
average to achieve their mass adoption more importance. As every token
hockey stick curves, in spite of the fact project is different, valuators need to
that consumers were used to mobile develop a modular approach in which
texting for many years. Most ICO they build models based on the type of
projects are still in the phase of project, the function of the token and
development. Once these decentralized how this relates to its supply dynamics.
products and services are made There is no one size fits all model for
available, the furnishers of the company token valuation. Based on the type of
behind the project will have to deal with token being analysed, model builders
switching costs, customer feedback will need to select the most pertinent
loops and other such factors that will variables and create models that
determine their success and give us a respect the nature of the project.
true gauge of the potential behind these
innovative solutions being provided. As As we have seen, the current practise of
this process occurs, there will some retrofitting stock valuation methods has
variables that hold more gravitas limited applicability. It has been our
compared to others and it is only by attempt to go back to the basics and
continuously analysing this evolution start the conversation on token
that model makers will be able to valuation with a fresh lens by focusing
determine what needs to be considered, on the variables of analysis. We are
and to what extent, when building a certain that moving forward, this list of
token valuation methodology. variables will grow owing to the
complex nature of this technology and
Secondly, as tokens function on this new investment vehicle.
blockchains which can be used as value
56
Appendix 1
Taxonomy of Tokens
1. Crypto – currencies:
§ Perform the 3 functions of money
§ Is network specific and can be forked
§ Differences in supply schedules, Proofs (Work, Stake, Existence, Elapsed Time,
Process, etc…)
§ Public or Private == Traded on exchanges
§ Examples – Bitcoin, Ripple, Dash, Ether, Monero, ZCash, etc…
2. Crypto – Commodities:
§ Represent digital commodities used to make digital goods & products.
§ The main digital goods and services that are considered crypto-commodities
include – Computing Power, Storage Capacity, Network bandwidth, Transcoding
and Proxy Re-encryption.
§ Examples -
o Computing Power (Ethereum)
o Storage Capacity (Storj)
o Network Bandwidth (Privatix)
o Transcoding = MP4 to MP3 (Transcodium)
o Proxy Re-encryption =email forwarding (NuCypher)
3. Crypto – Tokens:
§ Built on a robust crypto-currency and crypto – commodity infrastructure
§ Can issue a token which is intrinsically linked to a digital service or product
(dAPP / ERC20)
§ Can be part of its own Network and Blockchain Eg: Waves)
§ If based on a network (eg: Ethereum), will pay the network for certain kinds of
transactional operations.
57
Image Source : The Token Classification Framework: A multi-dimensional tool for understanding and classifying
crypto tokens (Euler, 2018)
58
Source: The Anatomy of ERC20: What’s on the Inside of Ethereum’s Most Popular
Contract (Nash, 2017), Anatomy of a Smart Contract (Jones, 2017)
Smart Contract code (Solidity in this case) contains four major types of entities:
variables, functions, events, and modifiers.
§ Variables are the data storage component of any smart contract and, in the case
of a token’s smart contract, store balances for each user-address, along with
other data required for the smart contract to operate.
§ Functions describe the rules by which the smart contract operates, storing
discrete chunks of code that perform specific tasks. Functions are executed (or
“called”) by sending a specially formatted transaction to the Ethereum network.
Functions are identified by a name and a set of parameters or “arguments,” that
are the inputs to the function.
§ Events are signals that a smart contract sends to other applications or smart
contracts programmed to receive them—acting as a form of logging.
§ Modifiers allow a developer to easily restrict the execution of a function under
certain conditions. For example, a developer may restrict the ability to mint new
tokens to the smart contract owner alone.
Analysing each function of the smart contract allows us to track how each line modifies
the meaning of, or data stored in, the smart contract. ERC20 defines the functions
balanceOf , totalSupply , transfer , transferFrom , approve , and allowance . It also
has a few optional fields like the token name, symbol, and the number of decimal
places with which it will be measured.
§ totalSupply(): Although the supply could easily be fixed, as it is with Bitcoin, this
function allows an instance of the contract to calculate and return the total amount
of the token that exists in circulation.
§ balanceOf(): This function allows a smart contract to store and return the balance
of the provided address. The function accepts an address as a parameter, so it
should be known that the balance of any address is public.
§ approve(): When calling this function, the owner of the contract authorizes, or
approves, the given address to withdraw instances of the token from the owner’s
address. Here, and in later snippets, you may see a variable msg . This is an implicit
field provided by external applications such as wallets so that they can better
interact with the contract. The Ethereum Virtual Machine (EVM) lets us use this
field to store and process data given by the external application.
§ transfer(): This function lets the owner of the contract send a given amount of
the token to another address just like a conventional cryptocurrency transaction.
59
Consider transferring money to pay a bill. It’s extremely common to send money
manually by taking the time to write a check and mail it to pay the bill off. This is like
using transfer() : you’re doing the money transfer process yourself, without the help
of another party. In another situation, you could set up automatic bill pay with your
bank. This is like using transferFrom() : your bank’s machines send money to pay
off the bill on your behalf, automatically. With this function, a contract can send a
certain amount of the token to another address on your behalf, without your
intervention.
Token Name, Token Symbol (Ticker) and Number of Decimals (normally 18 with ERC20
Tokens) are optional. The image below summarizes the points above and shows us
how an ERC20 contract looks like:
Source: What Is ERC20? | Everything You Need To Know About ERC20? (Singh, 2018)
Unfortunately, the initial approach presents challenges that are often difficult for DApp
(Distributed Application) developers. A DApp’s presentation logic has dependencies at
runtime, such as an address of a node on the network (DNS, IP, URI), as well as a
port to communicate with. The DApp also needs to know the Ethereum address of the
smart contract that is deployed on the blockchain, which is not easily discoverable.
Finally, it also needs access to secure private keys, which can be manually inserted by
using a file, a blockchain wallet, or a secure device.
60
To pull business logic up above the blockchain to a separate middle layer, the logic
code needs access to a variety of services, including secure execution, attestation,
identity, cryptographic support, data formatting, reliable messaging, triggers, and the
ability to bind that code to schema in specific smart contracts on any number of
blockchains. Those services can be provided in a fabric, where the individual pieces of
code that support the smart contracts can execute, send transactions to Blockchain
nodes, and be bound to the schema in the data tier.
To get a clearer picture of how this separation of concerns is achieved, we can separate
out the different portions of a smart contract into discrete components. These basic
components are the properties (static and variable), the logic and the ledger. Each of
these components can be mapped directly into technical concepts. Properties
represent a data schema, logic represents code, and the ledger corresponds to a
database. Once each of these components are defined, they can be deployed to
environments that are optimized for their function.
The smart contract is now a composite of the on-chain Solidity smart contract that
defines the data schema on the blockchain, and a Cryptlet20 that hosts the logic for
the smart contract. These Cryptlets can be run on a different computer or the cloud,
rather than the actual nodes, and as a result, do not need to be executed by every
node on the network. Cryptlets execute in a secure computational environment, and
have the cryptographic primitives that allow them to work directly with blockchains,
thereby extending smart contracts off the blockchain within the same security
envelope.
20
To pull business logic up above the Blockchain to a separate middle layer, the logic code needs
access to a variety of services, including secure execution, attestation, identity, cryptographic
support, data formatting, reliable messaging, triggers, and the ability to bind that code to schema in
specific smart contracts on any number of Blockchains. Those services can be provided in a fabric,
where the individual pieces of code that support the smart contracts can execute, send transactions
to Blockchain nodes, and be bound to the schema in the data tier. We refer to these code blocks as
Cryptlets, and the execution environment they run is called the Cryptlet Fabric
61
BIBLIOGRAPHY
Adem Efe Gencer, S. B. (2018). Decentralization in Bitcoin and Ethereum Networks. Initiative for Cryptocurrencies
and Contracts (IC3) Computer Science Department, Cornell University & Electrical Engineering
Department, Technion.
Alabi, K. (2017). Digital blockchain networks appear to be following Metcalfe’s Law . Electronic Commerce
Research and Applications, 23-29.
Antos, J. (2018, March 6). An Efficient-Markets Valuation Framework for Cryptoassets using Black-Scholes Option
Theory. Retrieved from Medium: https://medium.com/therationalcrypto/an-efficient-markets-
valuation-framework-for-cryptoassets-using-black-scholes-option-theory-a6a8a480e18a
Arthurs, J. (2018, June 6). Authers’ Note: Vorsprung dürch Technical Analysis. Retrieved from Financial Times:
https://www.ft.com/content/52b3ccea-6930-11e8-b6eb-4acfcfb08c11
Burniske, C. (2017, August 12). The Crypto J-Curve . Retrieved from Medium:
https://medium.com/@cburniske/the-crypto-j-curve-be5fdddafa26
Burniske, C. (2017, August 12). The Crypto J-Curve . Retrieved from Medium :
https://medium.com/@cburniske/the-crypto-j-curve-be5fdddafa26
CB Insights. (2018, Feburary 22). 19 Corporations Working On Blockchain And Distributed Ledgers . Retrieved
from CB INSIGHTS: https://www.cbinsights.com/research/organizations-corporates-test-blockchains-
distributed-ledgers/
Cimpanu, C. (2018, March 29). 81% of Recent ICOs Were Scams, Research Finds . Retrieved from Bleeping
Computer: https://www.bleepingcomputer.com/news/cryptocurrency/81-percent-of-recent-icos-
were-scams-research-finds/
CNBC. (2013, Nov 3). BK explains gold's 'vomiting camel' pattern . Retrieved from CNBC:
https://www.cnbc.com/video/2014/11/03/bk-explains-golds-vomiting-camel-pattern.html
David Larrabee, C. (2013, March 6). Can Technical Analysis Boost Portfolio Returns? . Retrieved from Enterprising
Investor - CFA Institute : https://blogs.cfainstitute.org/investor/2013/03/06/can-technical-analysis-
boost-portfolio-returns/
David M. Smith, C. F. (2013). Head and Shoulders Above the Rest? The Performance of Institutional Portfolio
Managers Who Use Technical Analysis . Money Science: Finanical Intelligence Network.
Devoe, R. (2018, June 19). Bogus ICO Ratings Easy to Buy, Reveals Alethena . Retrieved from Blockonomi:
https://blockonomi.com/alethena-fake-reviews/
Eghbal, N. (2018, July 18). Methodologies for measuring project health. Retrieved from
https://nadiaeghbal.com/project-health
62
Euler, T. (2018, January 18). The Token Classification Framework: A multi-dimensional tool for understanding and
classifying crypto tokens. Retrieved from Untitled INC: http://www.untitled-inc.com/the-token-
classification-framework-a-multi-dimensional-tool-for-understanding-and-classifying-crypto-tokens/
Fadilpašić, S. (2018, April 19). The Vomiting Camel Spotted in the Market . Retrieved from cryptonews:
https://cryptonews.com/news/the-vomiting-camel-spotted-in-the-market-1616.htm
Financial Stability Board. (2018). Crypto-assets: Report to the G20 on work by the FSB and standard-setting
bodies. Financial Stability Board.
Godbole, O. (2018, March 28). Why Bitcoin's 'Death Cross' May Be a Bear Trap . Retrieved from Coindesk:
https://www.coindesk.com/why-bitcoins-death-cross-may-become-a-bear-trap/
Grincalaitis, M. (2017, September 17). The ultimate guide to audit a Smart Contract + Most dangerous attacks in
Solidity . Retrieved from Medium: https://medium.com/@merunasgrincalaitis/how-to-audit-a-smart-
contract-most-dangerous-attacks-in-solidity-ae402a7e7868
Grincalaitis, M. (2018, May 9). The Ultimate Guide to Test Your Smart Contract . Retrieved from Medium:
https://medium.com/@merunasgrincalaitis/the-ultimate-guide-to-test-your-smart-contract-
ddc65fbb5ba5
Gupta, A. D. (2018, July 3). Smart Contracts: Fulfilling Nakamoto's Dreams . Retrieved from Stratumn Thinking:
http://blog.stratumn.com/smart-contracts-the-nakamoto-way/
Jones, S. (2017, Feburary 14). Anatomy of a Smart Contract. Retrieved from Blockchain Expo World Series:
https://www.blockchain-expo.com/2017/02/blockchain/anatomy-smart-contract/
Klaus, I. (2014). Forging Capitalism: Rogues, Swindlers, Frauds, and the Rise of Modern Finance. Yale University
Press.
Koffman, T. (2018, April 13). Your Official Guide to the Security Token Ecosystem . Retrieved from Medium:
https://medium.com/@tatianakoffman/your-official-guide-to-the-security-token-ecosystem-
61a805673db7
Kordez, P. (2017, September 4). Network Output and Velocity of Tokens . Retrieved from Medium:
https://medium.com/d2-capital/network-output-and-velocity-of-tokens-da7e800ca4c0
Lacalle, D. (2017). Escape from the Central Bank Trap: How to Escape From the $20 Trillion Monetary Expansion
Unharmed. Business Expert Press.
Lannquist, A. (2018, March 7). Today’s Crypto Asset Valuation Frameworks. Retrieved from Medium:
https://blockchainatberkeley.blog/todays-crypto-asset-valuation-frameworks-573a38eda27e
Lessing, L. (2000, January 01). Code Is Law . Retrieved from Harvard Magazine:
https://www.harvardmagazine.com/2000/01/code-is-law-html
Martin, K. (2018, April 19). The truth behind the vomiting camel graph . Retrieved from Financial Times:
https://www.ft.com/video/2452d265-ef0e-4f7f-b0b2-ca1dc076ff33
Martin, K. (2018, April 19). The Vomiting Camel has escaped from Bitcoin zoo . Retrieved from Financial Times:
https://ftalphaville.ft.com/2018/04/19/1524110400000/The-Vomiting-Camel-has-escaped-from-
Bitcoin-zoo/
Metcalfe, R. (2013). Metcalfe's Law after 40 Years of Ethernet . ACM Digital Library, 26-31.
63
Milano, A. ( 2018, July 23). An $8 Million Airdrop Ran Out of Tokens – What's Next Is Anyone's Guess. Retrieved
from Coindesk: https://www.coindesk.com/8-million-airdrop-cryptocurrency-run-out-tokens/
Murphy, H. (2018, July 23). Pumping and dumping in crypto markets . Retrieved from Financial Times:
https://www.ft.com/content/61ddfea4-8e72-11e8-bb8f-a6a2f7bca546
Nash, G. (2017, August 25). The Anatomy of ERC20: What’s on the Inside of Ethereum’s Most Popular Contract.
Retrieved from Medium: https://news.earn.com/the-anatomy-of-erc20-6ab09d4206a5
Olszewicz, J. (2016, November 3). My Ichimoku Cloud Settings For CryptoCurrency . Retrieved from Youtube:
https://www.youtube.com/watch?v=5x0r-qcGoQQ
Pei, A. (2018, March 28). Bitcoin is nearing a 'death cross' on the charts. Here’s what it means . Retrieved from
CNBC Markets: https://www.cnbc.com/2018/03/28/bitcoin-is-nearing-a-death-cross-on-the-charts-
heres-what-it-means.html
Que, D. (2018, March 28). What we learned from auditing the top 20 ERC20 token contracts . Retrieved from
Medium: https://blog.cryptofin.io/what-we-learned-from-auditing-the-top-20-erc20-token-contracts-
7526ef3b6fb1
Qureshi, H. (2018, Feburary 19). Stablecoins: designing a price-stable cryptocurrency. Retrieved from haseebq:
https://haseebq.com/stablecoins-designing-a-price-stable-cryptocurrency/
Samani, K. (2018, Feburary 13). New Models for Utility Tokens. Retrieved from Multicoin Capital:
https://multicoin.capital/2018/02/13/new-models-utility-tokens/
Sedgwick, K. (2018, Feburary 23). 46% of Last Year’s ICOs Have Failed Already . Retrieved from
https://news.bitcoin.com/46-last-years-icos-failed-already/
Singh, N. (2018, January 22). What Is ERC20? | Everything You Need To Know About ERC20? . Retrieved from
Cryptoniam: https://www.cryptoniam.com/what-is-erc20/
Wall Street Journal. (2018, August 5). Some Traders Are Talking Up Cryptocurrencies, Then Dumping Them,
Costing Others Millions. Retrieved from Wall Street Journal:
https://www.wsj.com/graphics/cryptocurrency-schemes-generate-big-coin/
Wilson, F. (2017, 06). ICOs and VCs . Retrieved from AVC: https://avc.com/2017/06/icos-and-vcs/
Xing-Zhou Zhang, J.-J. L.-W. (2015). Tencent and Facebook Data Validate Metcalfe’s Law . Journal of Computer
Science and Technology , 246–251.