Blockchain and Economic
Development: Hype vs. Reality
Michael Pisa and Matt Juden
Abstract
Increasing attention is being paid to
the potential of blockchain technology
to address long-standing challenges
related to economic development.
Blockchain proponents argue that it will
expand opportunities for exchange and
collaboration by reducing reliance on
intermediaries and the frictions associated
with them. The purpose of this paper
is to provide a clear-eyed view of the
technology’s potential in the context of
development. In it, we focus on identifying
the questions that development practitioners
should be asking technologists, and
challenges that innovators must address for
the technology to meet its potential.
hurdles to wider adoption. In part II, we
examine its potential role in addressing
four development challenges: (1) facilitating
faster and cheaper international payments,
(2) providing a secure digital infrastructure
for verifying identity, (3) securing property
rights, and (4) making aid disbursement
more secure and transparent. We argue that,
while blockchain-based solutions have the
potential to increase eficiency and improve
outcomes dramatically in some use cases
and more marginally in others, the key
constraints to addressing these challenges
often fall outside the scope of technology—
and that these constraints need to be
resolved before blockchain technology can
meet its full potential in this space.
In part I, we discuss what blockchain
technology does, how it works, and
Center for Global Development
2055 L Street NW
Fifth Floor
Washington DC 20036
202-416-4000
www.cgdev.org
This work is made available under
the terms of the Creative Commons
Attribution-NonCommercial 4.0
license.
www.cgdev.org
Michael Pisa and Matt Juden. 2017. “Blockchain and Economic Development: Hype vs. Reality.” CGD
Policy Paper. Washington, DC: Center for Global Development. https://www.cgdev.org/publication/
blockchain-and-economic-development-hype-vs-reality
The authors thank Divyanshi Wadhwa for her excellent research assistance. We are also grateful to the
many people who took the time to review earlier drafts and provide their insights, including Alan Gelb,
Michael Graglia, Houman Haddad, Aaron Klein, Charles Kenny, Paul Nelson, Vijaya Ramachandran,
Staci Warden, Ryan Zagone and participants at a CGD roundtable. Any errors are solely the authors’
responsibility.
CGD is grateful for contributions from the Bill & Melinda Gates Foundation and the William and
Flora Hewlett Foundation in support of this work.
CGD Policy Paper 107
July 2017
Contents
Introduction ...................................................................................................................................... 1
Blockchain and development ..................................................................................................... 1
The purpose of this paper .......................................................................................................... 2
Part I. Understanding blockchain technology ............................................................................. 5
The importance of trust .............................................................................................................. 5
Trust through technology: Bitcoin and beyond ...................................................................... 6
Part II. Potential applications of blockchain technology for economic development ........ 16
Facilitating faster and cheaper international payments ........................................................ 16
Providing a secure digital infrastructure for verifying identity ........................................... 22
Securing property rights............................................................................................................ 28
Making aid disbursement more secure and transparent ...................................................... 31
Concluding thoughts...................................................................................................................... 34
Appendix: proof of work .............................................................................................................. 37
Bibliography .................................................................................................................................... 42
Introduction
Technological innovation is often regarded as the primary driver of long-term economic
growth, and the pace of innovation has arguably never been faster. So it is unsurprising that
a growing number of development experts have focused their energy on exploring how new
digital technologies could be used to reduce poverty and improve the lives of the poor. The
idea that innovation can help to not only reduce poverty at low cost but also improve how
the public and private sectors function has obvious appeal, particularly in a world where
development aid agency budgets are under increasing pressure.
The evolution of mobile money offers an example of how rapidly the adoption of a new
technology (or, more accurately, a new combination of existing technologies) can improve
economic outcomes for the world’s poorest. The first project to use mobile phones as a
platform for financial services was launched in the Philippines in 2001 but it was not until
the success of M-Pesa in Kenya, introduced six years later, that the development community
began to fully grasp the potential of the technology to alleviate poverty. Since that time, the
number of experts, donors, and policymakers working on digitally enabled financial inclusion
has grown rapidly, as have the number of initiatives. Today, mobile money services are
offered in 92 countries, supporting more than 174 million active accounts, and there is
growing evidence that these services can help to alleviate poverty (GSMA 2017). 1
Blockchain and development
More recently, development experts have turned their attention to the potential of
blockchain technology to address long-standing challenges related to economic
development.
At its heart, a blockchain is a data structure in which every modification of data is agreed to
by participants on a network. Once a data modification has been agreed to, it is combined
into a “block” with other modifications that have taken place within the same, short
timeframe. This block is then appended to a chain of previously agreed upon blocks,
creating a complete record of all the data modifications that have ever taken place.
Cryptography (encoding) is used to ensure that previously verified data modifications are
safe against tampering by any participant or minority of participants, and that no new
modifications can be made without detection. As a result, participants can trust the data held
on a blockchain without having to know or trust one another and without having to rely on
a central authority like a bank, credit card company or government. For this reason,
blockchain technology has been referred to as a “trust machine” (The Economist 2015).
A recent report by Tavneet Suri and William Jack (Konner 2017) estimates that M-Pesa helped to bring
194,000 households in Kenya out of extreme poverty in its first six years. Similarly, a recent case study conducted
by the Better Than Cash Alliance (2017) reported that allowing Kenyan farmers to repay loans provided by the
One Acre Fund using M-Pesa reduced payment leakages by 85 percent and saved farmers significant time.
1
1
Blockchain enthusiasts claim that the technology will greatly expand opportunities for
economic exchange and collaboration by reducing the need to rely on intermediaries and the
frictions associated with them. The technology has obvious appeal to the development
sector, where trust—both between individuals and in institutions—is seen as an important
precursor to growth.
With such great promise comes great enthusiasm and the hype surrounding blockchain
technology continues to grow. While this excitement is understandable, it also creates a risk
that development organizations embrace and begin to rely on the technology before they
fully understand it, which raises concerns about data security and potential financial losses.
There is also the possibility that blockchain-based applications simply fail to live up to the
hype.
The purpose of this paper
Even though blockchain is a young and rapidly evolving technology, it is not too early to
assess the opportunities and risks that it presents. The purpose of this paper is to provide a
clear-eyed view of the potential of the technology to help meet economic development
goals. Throughout the paper, we focus on identifying the questions that development
practitioners should be asking technologists, and the challenges that innovators must address
for the technology to meet its potential in this space. We also try to simplify some of the
more complicated aspects of the technology, starting with an overview of taxonomy in box
1.
In part I, we discuss what blockchain technology does, how it works, and hurdles to wider
adoption. In part II, we examine its potential role in addressing four development
challenges: (1) facilitating faster and cheaper international payments, (2) providing a secure
digital infrastructure for verifying identity, (3) securing property rights, and (4) making aid
disbursement more secure and transparent.
Our central finding is that blockchain-based solutions have the potential to increase
efficiency and improve outcomes dramatically in some use cases and more marginally in
others, however the key constraints to addressing these challenges often remain outside the
scope of technology. 2 For blockchain-based solutions to reach their full potential in this
space, governments and development organizations first need to take steps that they have
often resisted in the past (e.g., donors agreeing to use common reporting systems,
governments creating reliable land registry systems). The good news is that excitement about
the technology has already generated more interest (and investment) by some of these
organizations in addressing these underlying challenges.
2
It is beneficial to distinguish between cases where new innovations are potentially useful to attaining a goal
and where they are essential. For example, multi-modal biometrics appear to be essential for ensuring that
identities are unique in large populations. The blockchain solutions examined in this paper generally fall into the
category of useful but not essential.
2
Box 1: Taxonomy
One consequence of the rapid pace of experimentation related to blockchain technology, is
that the terminology surrounding it remains unsettled. 3 For that reason, it is useful to briefly
summarize what we mean when we use certain terms.
Digital currency is a medium of exchange that is stored electronically in a series of bits (0s
and 1s) stored in a computer file. Importantly, this includes national fiat currency stored
electronically in a bank account. Under this broad definition, over 95 percent of the world’s
currency in circulation is stored in digital rather than physical (i.e., cash) form. (Desjardins
2015)
Virtual currency is a subset of digital currency that is not issued by a central bank or public
authority nor attached to a fiat currency, i.e., currency that a government declares to be
legal tender.
A cryptocurrency is a digital currency that relies on cryptography to secure the creation of
new currency and transfer of funds, removing the need for a central issuing authority such as
a central bank. While all the cryptocurrencies that we examine in this paper are issued by
non-government actors, several countries (most notably China) are already exploring the idea
of issuing their own cryptographically secured digital fiat currencies (Knight 2017).
The most famous cryptocurrency is bitcoin. We use a common approach of using the
capitalized “Bitcoin” to refer to the underlying technology and the lowercase “bitcoin” to
refer to units of currency.
Bitcoin is made possible by a blockchain data structure, in which every modification of data
on a network is recorded as part of a block of other data modifications that share the same
timestamp. This block is appended to a chain of such blocks, creating a record of all data
modifications on the network for all time.
Before data modifications are accepted into blocks and become part of a blockchain, a
majority of computers (or nodes) on the blockchain network must first agree that they are
valid. They do this by means of a consensus mechanism, which lays out a set of rules (or
protocol) according to which agreement will be reached. 4
The consensus mechanism employed by bitcoin is proof of work, in which computers on
the network compete to earn the right to upload a transaction block to a blockchain by
solving a computationally intensive, cryptographic puzzle.
It is appropriate to use a proof-of-work consensus mechanism in a permissionless system,
in which any computer can join the network and take part in validating data modifications.
In a permissioned system, the membership of validating computers is restricted. This
3 See Walch (2017) The Path of a blockchain Lexicon (and the Law) for a good review of the shifting nature of
blockchain terminology and its implications for regulation, here https://www.bu.edu/rbfl/files/2017/02/ThePath-of-the-Blockchain-Lexicon-Feb-13-2017-Draft.pdf
4 Also referred to as consensus protocol or consensus algorithm.
3
means that permissioned systems can make use of less computationally intensive consensus
mechanisms that are more appropriate for a pre-vetted, more trusted membership. 5
Public blockchains can be inspected by anyone, whereas private blockchains can only be
inspected by computers that have been granted access rights. 6
Some of the solutions examined in this paper use a hybrid approach that involves tracking
data modifications on a private blockchain and recording hashes of these changes on a
public blockchain. In this approach, the public blockchain effectively serves as a notary for
data modifications by verifying that they occurred and at what time.
Some blockchains contain in their ledgers scripts of computer code created by users that
automatically execute under a set of pre-determined conditions. These scripts are often
referred to as smart contracts. 7 Such code could be used, for example, to publicly guarantee
insurance payments to a set of farmers under particular weather conditions.
Strictly speaking, a blockchain is only one of the possible data structures for creating a
distributed ledger on a network, in which participants who do not trust each other hold a
copy of the ledger and new entries are added to the ledger only in accordance with a
consensus protocol. “Distributed ledger technology,” or DLT, is therefore often used as
a generic term for such protocols, rather than blockchain technology.
“Shared ledger technology,” or SLT, is similarly sometimes used as a generic term for
blockchain-like protocols, though it can also be used in a restrictive sense to refer to ledger
protocols in which data is only shared with relevant participants rather than being distributed
to the whole network.
To date, no agreement has been reached on the precise criteria for determining what counts
as a blockchain and what does not. 8 It remains common practice to use “blockchain” as a
generic term for different types of distributed ledgers, and we believe there is utility in having
a generic term that extends beyond distributed ledgers to also include solutions like shared
ledgers and Ripple’s Interledger Protocol. 9 For this reason, we use “blockchain
technology” as a generic term to include all approaches related to and inspired by Bitcoin’s
original blockchain.
5 The alternative consensus mechanisms to proof-of-work are many and varied. See, for example, Practical
Byzantine Fault Tolerance (http://pmg.csail.mit.edu/papers/osdi99.pdf) and The Stellar Consensus Protocol
(https://www.stellar.org/papers/stellar-consensus-protocol.pdf)
6 This means that it is possible to have a public, permissioned ledger, like that used by the Sovrin
Foundation (https://www.sovrin.org/technology.html#publicPermissioned).
7 Although some technologist have argued that these scripts are neither particularly smart nor are the
contracts (since they are not necessarily legally enforceable). See Monax: https://monax.io/explainers/
smart_contracts/ and David Birch: https://youtu.be/hS15p5V3slg?t=1463
We stick with the term, which was first used by Nick Szabo in 1994, because it is well established.
8 It is often argued that permissioned systems that use a consensus mechanism other than proof-of-work are
not blockchains. However, such systems often still result in a data structure of grouped, time-stamped entries
appended one after the other in a manner that looks very similar to a chain of blocks. See, for example, Stellar’s
protocol: https://www.stellar.org/developers/guides/concepts/ledger.html
9 For more information about the Interledger Protocol, see section on payments in part II.
4
Part I. Understanding blockchain technology
The importance of trust
“Almost every commercial transaction has within itself an element of trust, certainly any transaction conducted over a
period of time. It can be plausibly argued that much of economic backwardness in the world can be explained
by the lack of mutual confidence.”
— Kenneth Arrow (1972)
Economic exchange requires trust. At the most basic level, we must have a reasonable
expectation that the individuals and institutions with whom we consider trading will not take
advantage of us, regardless of our capacity to monitor their actions. 10 Without this
expectation, the risk of opportunism will likely outweigh the potential benefits of engaging in
a trade, causing us to forego it.
Within a village or small community, trust is developed and maintained through a dense web
of social relationships. However, when individuals trade with parties beyond the boundaries
of their village, they must rely on other means to create trust. This includes relying on
institutions that improve monitoring and contract enforcement (e.g., the development of
standardized weights and measures, units of account, and merchant law courts), as well as
intermediary organizations that internalize the cost and benefit of facilitating exchange
(North 1991). 11
Today, virtually every type of economic exchange that takes place outside of face-to-face
cash transactions requires the intervention of a trusted third party (in fact, it can be argued
that even cash transactions require a trusted third party since governments assure cash’s use
as legal tender). When we purchase goods online, we rely on a credit card company or bank
to verify and process the payment. When we send money to friends or family members, we
rely on money service businesses to oversee the transaction. And when we want to establish
an ownership claim to an asset, we rely on central authorities, including the government, to
confirm our property rights.
By verifying the identity of participants to a transaction, overseeing clearing and settlement,
and preserving a record of exchange, these intermediaries reduce uncertainty and enable
exchange between parties that may have no reason to trust one another. In doing so, they
expand the set of potential opportunities for exchange and unlock potential growth.
However, there are several reasons why we may not want to rely on third parties to provide
these functions. First, and most obvious, are the fees that intermediaries charge for their
services, which can be quite high. For example, the average fee charged by a credit card
company to a merchant for a single transaction is 2 percent (Value Penguin 2017), while the
10
This is a slight variation on the definition of trust used in Gambetta (2000).
Bettina Warburg (2017) neatly summarizes how Nobel Laureate Douglass North’s work on institutions
relates to blockchain technology in her November 2016 Ted Talk.
11
5
average fee for sending remittances is 7.4 percent (World Bank 2016). Relying on third
parties can also be inefficient. This is particularly the case for cross-border financial
transactions, which often require multiple intermediaries and take an average of 3-5 business
days to clear. Relying on third parties also entails cybersecurity risks, as storing sensitive data
on centralized servers creates a “honeypot” for would-be hackers and a single point of
failure. Finally, there may be good reason to question how trustworthy the “trusted third
parties” we deal with actually are. Public confidence in financial institutions cratered during
the global financial crisis, and it may be more than mere coincidence that the Bitcoin
protocol, which aimed to provide an alternative to the formal financial system, was
introduced in October 2008, as the global financial crisis was taking hold.
Trust through technology: Bitcoin and beyond
“One thing that’s missing but will soon be developed is a reliable e-cash, a method whereby on the Internet you can
transfer funds from A to B without A knowing B or B knowing A—the way I can take a $20 bill and hand it over to
you, and you may get that without knowing who I am.”
— Milton Friedman (1999)
Bitcoin first appeared in 2008, when a person (or group of people) writing under the
pseudonym Satoshi Nakamoto published a nine-page paper titled Bitcoin: A Peer-to-Peer
Electronic Cash System. The paper outlined a set of rules (or a “protocol”) by which computers
on the Bitcoin network would operate and communicate with one another. 12 These rules
were designed so that individuals using bitcoin could trust that, even if everyone on the
network acted out of pure self-interest, they would not be cheated in an exchange through
double-spending, which occurs when the same unit of currency is used in more than one
transaction. This vulnerability is unique to digital currencies and the main reason that digital
currency systems invented prior to Bitcoin failed to gain traction.
The double-spend problem exists because digital money is simply a string of bits, and so is
easy to copy. The same holds true for all digitally stored information. For example, when I
email someone a pdf document, the original remains on my computer while a digital copy is
sent to the recipient; sending it to others does not prevent me from accessing the file. While
the ease with which users can reproduce and share digital information is a feature in many
cases, it is a critical vulnerability for a system of currency. Despite our frequent use of digital
payments, the double-spend problem is not something we consider in our day-to-day lives,
because of our unquestioning reliance on trusted third parties. But, as we’ve established, this
reliance comes at a cost.
12
It is worth noting that all the underlying technologies that made the creation of Bitcoin possible existed at
least 10 years earlier. This includes public key encryption (invented by Diffie and Hellman in 1976); digital time
stamping (Haber and Stornetta 1991); and the Hashcash proof of work (Back 2002). Nakamoto’s key
contribution was combining these technologies with a protocol that incentivized participation. Brian Goss (2017)
makes this point in an online lecture here: https://www.udemy.com/bitcoin-or-how-i-learned-to-stop-worryingand-love-crypto/learn/v4/t/lecture/294346?start=0
6
Resolving the double-spend problem without having to rely on trusted intermediaries
required finding a way for actors who may not know or trust one another to reach
unanimous agreement, or consensus, about who owns what at a particular time. Nakamoto
met this challenge by combining preexisting technology in computer networking and
cryptography in an innovative way, resulting in the creation of a transparent, trustworthy,
and immutable record of transactions, which we now know as a blockchain (Tapscott 2017).
The power of blockchain technology rests on the interaction between three elements: a
distributed ledger, a consensus protocol, and a novel data structure.
Distributed ledger
A ledger is simply a book or computer file that records transactions. So, in one sense, we are
talking about an innovation in accounting. While this may not seem exciting at first glance, it
is worth noting that the invention of double-entry bookkeeping in the 1500s is often cited as
an important precursor of the spread of capitalism (Tapscott and Tapscott 2016).
Now consider the way the ledger is shared. The vast majority of computing services that we
use today run on centralized networks, in which a central hub or “server” stores and
distributes information to other computers on the network called “clients.” In contrast,
Bitcoin and other blockchain systems run on peer-to-peer (P2P) networks in which all nodes
(or computers) have equal status and simultaneously function as both client and server to
one another. A key advantage of this approach is that there is no “single point of failure,”
like a centralized server.
Figure I
7
Every node on a blockchain network stores an up-to-the-minute version of the ledger and
participates in the consensus process. The state of the ledger reflects the consensus reached,
which is why blockchain is often referred to as a “single source of truth.” From the
perspective of a large organization, like a multinational bank, that spends significant
resources in reconciling records with other counterparties, the ability of a blockchain to
update automatically and nearly simultaneously across participants (synchronization) could
save a significant amount of money.
Consensus protocol
Nakamoto’s key innovation was the idea that consensus could be generated by incentivizing
nodes on the network to work through a computationally intensive, cryptographic puzzle
that, once solved, produces a record of transactions that all participants can see. This
process, known as the proof of work, obliges nodes to earn the right to validate and publish the
latest block of transactions by becoming the first to solve the puzzle—and then rewards the
node that does so with new bitcoin. Because winning nodes earn a valuable reward for their
labor, their participation in the proof of work is often referred to as “mining” and they as
“miners.” The term “mining” is also used because it is the source of new bitcoin on the
network.
The proof of work can be solved only through brute computational force, which requires
computers on the network to make millions of guesses per second at the answer. This entails
a significant investment in computer processors and electricity, which makes it extremely
costly and therefore extremely difficult for dishonest actors on the network to overpower
honest ones. 13 In this way, the competition maintains the integrity of the ledger, as the realworld cost introduced creates confidence among participants that they will not be taken
advantage of. A more detailed explanation of proof of work is provided in the appendix.
Data structure
Nodes continuously monitor the network for incoming transaction messages and group
these transactions into blocks. The information in the blocks then serves as input into the
proof of work challenge. Once a node becomes the first to solve the challenge, it “seals off”
the block it is working on and sends it to other nodes on the network to verify the solution
and that all the transactions in the block are legitimate. This verification happens within
seconds and, once complete, the new block is added to a blockchain.
Each block added to a blockchain contains three important pieces of information in addition
to a record of recent transactions: (1) a timestamp, which establishes the agreed upon order
13
“Overpowering honest nodes” here refers to the possibility that an individual or group of individuals that
controlled a majority of the mining power on a public blockchain network could, theoretically, use that power to
enable double spending and prevent transaction confirmations. This risk is often referred to as a “51 percent
attack.” Although it is difficult to amass this much mining power, it can be done by “mining pools,” which
combine computing power across Bitcoin miners and split any rewards earned by the group based on the amount
of hashing power contributed. One mining pool in China, Ghash.io, briefly crossed the 51 percent threshold in
2014 (Hruska 2014).
8
of transactions; (2) an alphanumeric string called a hash, which cryptographically combines
all the data in a block into a single unique value; and (3) a reference to the previous block’s
hash. 14 The hash provides a unique ID for each block and, importantly, reacts to even the
smallest modification in the underlying transaction data by changing in an unpredictable way.
Including a link to the previous block’s hash in each new block creates a chain between them
that extends all the way down to the first block created. The existence of this chain
combined with the sensitivity of hash values to modification act as a safeguard against
tampering: if someone were to try to alter a transaction in a block, it would trigger a change
not only to that block’s hash but also in the hashes of all the blocks subsequently appended
to the chain, making it easy for the network to detect (Lewis 2016). To cover up any traces
of tampering, an attacker would need to win multiple proof of work contests to publish not
only the block containing the altered transaction but also all the blocks that came after it.
The probability of being able to do this decreases exponentially as the number of blocks
increases, making records stored on a blockchain effectively immutable after sufficient time
has passed. This creates the possibility of using the blockchain to store valuable digital assets,
including land titles and contracts. 15
The way data is stored and connected on a blockchain also makes it easy to track the
movement and provenance of assets, including not only cryptocurrencies but also any
physical asset that is tied to a digital token. This feature could help facilitate supply chain
management by enhancing transparency and preventing fraud and is particularly useful when
the origin of a product is important, as in the case of diamonds. This use case is discussed in
greater detail in part II.
In summary, blockchain technology’s strength stems directly from these three factors and
the way they interact: the distributed nature of the ledger yields transparency and synchronization;
the consensus protocol negates the need for trust; and the way data is recorded, stored and
connected yields immutability and traceability. In part II, we examine how innovators are using
these features to create new solutions to development challenges.
Bitcoin’s challenge
Bitcoin effectively solved the double-spend problem, making it the first digital currency to
do so and propelling its rapid rise in use and value: as of early July 2017, bitcoin represents
47 percent of non-fiat digital currency transactions and 1 bitcoin is worth $2031, which is
$800 more than as an ounce of gold (CoinMarketCap 2017). Despite this, predictions that
14
As explained in greater detail in the appendix, all transaction messages in a block are “hashed” (i.e., run
through a cryptographic hash function) before being combined into pairs, which are then hashed again. This
process of hashing and combining pairs of encrypted messages is repeated until it ultimately produces a single
hash representing all the transactions in a block.
15 The Bitcoin network considers transactions as being confirmed only after they have been followed by five
subsequent blocks. As discussed in the appendix, the “six blocks deep” standard is largely arbitrary, but it does
ensure that tampering is quite unlikely unless an individual has a significant share of mining power on the
network, in which case it remains feasible.
9
the currency will eventually play a dramatically larger role in the economy are likely off the
mark for several reasons.
To usurp the role of national currencies, bitcoin would first need to fulfill some (though
perhaps not all) of the core functions that money provides, including serving as a medium of
exchange, a unit of account, and a store of value. 16 Currently, bitcoin does none of these
things very well: its extreme volatility prevents it from being a good store of value and unit
of account, and retailers and consumers—who appear satisfied with the cost/benefit
tradeoffs associated with using credit cards—have not accepted the currency widely enough
to consider it a reliable medium of exchange. National governments also present an obstacle:
currently, no government allows taxes to be paid with bitcoin, which reduces the incentives
for individuals and companies to use it.
The reluctance of national governments to accommodate bitcoin stems from two factors.
The first is the degree of pseudonymity (or pseudo-anonymity) bitcoin and other
cryptocurrencies afford their users by tying transactions to “wallets” instead of individual
identities. Much of the early news coverage of bitcoin focused on how the currency’s
pseudonymity fueled its use in illicit transactions, including illegal gun and drug purchases,
creating a stigma that has not yet disappeared. 17 The second, perhaps more durable, reason is
that governments are unlikely to allow bitcoin and other non-fiat digital currencies to replace
national currencies as the key medium of exchange, since this could result in a loss of control
over domestic monetary policy.
Rather than outright resisting the use of virtual currencies, most states are taking a cautious
approach to regulating them, as they try to balance potential benefits and risks. In the United
States, bitcoin and other virtual currencies are regulated as commodities, which means that
capital gains from appreciation are taxable, which further reduces retailers’ incentive to
accept it as payment (IRS 2014). In China, where most bitcoin transactions and mining now
take place, the central bank stepped up its oversight of the country’s bitcoin exchanges in
early 2017, leading to a four-month moratorium on withdrawals. More generally, national
governments are taking steps to ensure that users of virtual currencies are held to the same
regulatory and consumer protection standards as users of fiat currency.
Even if national governments choose not to resist broader usage of bitcoin, there are
questions about the technology’s ability to scale due to the speed of the network. Currently,
the Bitcoin blockchain can process a maximum of seven transactions per second. To put this
in context, Visa processes an average of 2,000 transactions per second and has a peak
capacity of 56,000 transactions per second (VISA Inc. 2014). Increasing the speed of the
Bitcoin network could be accomplished through increasing block size. This is technically
16
Thanks to Staci Warden, executive director of the Center for Financial Markets at the Milken Institute, for
making this point.
17 Whether cryptocurrencies provide similar or more anonymity than cash is debatable. While cash is
intrinsically more anonymous than cryptocurrency, exchanges involving cash require some form of physical
delivery, which makes it easier to identify the parties in an exchange. This is why recent ransomware attacks have
required payment in bitcoin rather than cash.
10
feasible, but some network participants have resisted it, since it would increase the cost of
mining bitcoin and give more control to larger entities, leading to greater centralization of
the network (WeUseCoins 2013).
Finally, there are concerns about the energy intensity of mining. Although estimates vary
widely, some indicate that bitcoin mining could consume 14,000 megawatts of electricity by
2020, which is comparable to Denmark’s total energy consumption (Coleman 2016). 18
For all these reasons, bitcoin is unlikely to ever challenge the role of national currencies.
However, it can still play a number of useful economic roles, including serving as a bridge
currency for cross-border payments (which we explore in more detail in part II).
Blockchain technology evolves
Regardless of Bitcoin’s future, there is general agreement that blockchain technology will
have an important (some say transformational) impact on economic exchange and
development.
The realization that blockchain technology can solve not only the double-spend problem but
also other challenges where groups of people need to reach agreement on a set of facts has
spurred technologists to create new blockchain models that vary across three characteristics:
the content of what is stored on the ledger, the process used to reach consensus, and the
degree to which the ledger is permissioned.
The most notable non-Bitcoin public blockchain is Ethereum, which was created in 2014.
Like Bitcoin, Ethereum runs on a public P2P network, utilizes a cryptocurrency (ether), and
stores information in blocks. 19 However, it has much broader functionality. Whereas the
Bitcoin blockchain was solely designed to store information about transactions, Ethereum
provides a built-in programming language and an open-ended platform that allows users to
create decentralized applications of unlimited variety. In other words, Ethereum is a
programmable blockchain, which is why it is often referred to as the world’s first distributed
computer. While distributing computing across a P2P network necessarily results in slower
and more expensive computation than normal, it also creates a database that is agreed to by
consensus, available to all participants simultaneously, and permanent, all of which are useful
when trust is a primary concern.
18
The energy intensity required by proof of work has led to a search for more efficient consensus protocols,
including “proof of stake” approaches. Whereas under proof of work the probability of earning the right to
validate a block is determined by the amount of computing power brought to bear, in a proof of stake system
that probability is determined by some measure of a node’s stake in the system (e.g., the amount of
cryptocurrency owned). While proof of stake protocols are more efficient than proof of work, it is unclear
whether they can provide the same level of security.
19 One additional similarity is that, for the time being, both Bitcoin and Ethereum use a proof of work
consensus protocol. However, Ethereum’s founders intend to shift to a proof of stake protocol by the end of
2017.
11
The open nature of Ethereum also allows users to put self-executing computer scripts, often
referred to as “smart contracts,” on a blockchain. 20 The terms of a smart contract are
established by two (or more) parties and lay out the conditions under which the contract will
execute. For example, in the context of humanitarian aid, an aid organization and a potential
recipient (e.g., a national government, local government, or individual) could agree to a
contract that would pay cash or provide a voucher if the intended beneficiary is in a region
affected by a natural disaster. This contract could even trigger automatically based on data
provided by a weather service. Such an approach could increase both the speed and the
transparency of aid distribution.
As noted, Bitcoin and Ethereum are both public, permissionless blockchains, which anyone
with the appropriate technology can access and contribute to. But many private firms are
uncomfortable relying on public blockchains as a platform for their business operations due
to concerns about privacy, governance, and performance. For this reason, a number of startups, including Ripple and the R3 Consortium (a group of more than 70 of the world's largest
financial institutions that focuses on developing blockchain solutions for the industry), have
developed platforms that run on private or permissioned networks on which only verified
parties can participate. Per the definitions suggested in box 1, these approaches fall within
the broader category of distributed ledger technology but are not blockchains because they
do not involve an intensive consensus protocol and do not store information in blocks.
As IBM Vice President Jerry Cuomo has noted, blockchain technology provides an “engine
blueprint” that technologists can work from to tailor solutions for different use cases.
Indeed, IBM has invested significant resources into helping the Linux Foundation design an
open-source modular blockchain platform called Hyperledger Fabric. In essence, Fabric
provides programmers with a “blockchain builders kit,” which allows them to tailor all
elements of a ledger solution, including the choice of the consensus algorithm, whether and
how to use smart contracts, and the level of permissions required. Many of the applications
discussed in part II are based on the Fabric protocol.
Remaining hurdles
Several challenges must be addressed before blockchain-based development solutions are
widely adopted. These include concerns about data privacy, operational resiliency, and
governance. There is also a need to further educate the development community about the
technology, including recognition of its limitations.
Data Privacy
Although the Bitcoin blockchain provides pseudonymity for its users, many blockchainbased solutions require sensitive data to be linked to an individual identity (e.g., linking a
property title to a homeowner, or identifying information to an aid recipient), which raises
concerns about data privacy. As Ethereum Founder Vitalik Buterin has noted “neither
20
It is possible to use smart contracts on the Bitcoin blockchain as well but the system was not designed to
directly support them.
12
companies nor individuals are particularly keen on publishing all of their information onto a
public database that can be arbitrarily read without any restrictions by one’s own
government, foreign governments, family members, coworkers and business competitors”
(Buterin 2016).
Using permissioned networks can help to allay some concerns about data privacy by limiting
the number of actors that can access a ledger but only to a degree. For example, the financial
industry continues to experiment with different permissioned ledger approaches but privacy
continues to be a challenge. Not surprisingly, many financial institutions remain wary about
putting transaction data on a distributed ledger because of their obligation to protect
customer privacy and their desire to keep their own commercially sensitive trades private.
Relatedly, a quasi-public immutable record of transactions may contravene customers’ legal
“right to be forgotten” if customer information cannot be dissociated from transactions.
Technologists are now exploring a variety of solutions to the privacy challenge, including the
use of “bidirectional payment channels,” which allow some transaction data to be stored off
a blockchain, and the application of zero-knowledge proofs, which allow transactions to be
verified publicly without revealing any underlying data about the transaction. 21 However,
each of these approaches involves tradeoffs and none has been tested in the real world yet.
Operational resiliency
One of the major selling points of blockchain technology is that it enhances resiliency by
moving data from a centralized database with a single point of failure to a distributed ledger
that runs on many nodes. 22 This advantage may be overstated, since organizations can backup sensitive data on multiple servers, but the bigger issue is that blockchain technology
remains largely untested.
Many of the solutions examined in this paper are intended for use by large organizations
(e.g., governments, global banks, multilateral organizations, international non-profits) that
tend to be risk-averse, slow to innovate, and rely on systems that have been tried and tested
over many years (over which time numerous bugs have been resolved). For that reason, and
because shifting to blockchain-based systems often requires wholesale rather than
incremental change, they will need to see evidence of significant benefit with little risk before
they consider making a switch.
Governance
Much of blockchain technology’s appeal stems from its decentralized nature, which seeks to
replace the role played by trusted intermediaries with a peer-driven consensus process.
21
The best known example of a network of bidirectional micropayment channels, the Bitcoin Lightning
Network, could help increase data privacy by reducing the amount of transaction data stored on a blockchain
(Poon and Dryja 2016); A working implementation of zero-knowledge proofs building on the bitcoin blockchain
is already live in the form of Zcash. See https://z.cash/ for an overview and https://github.com/zcash/zips for
technical detail.
22 For more on operational risk see Walch (2015): http://www.modernmoneynetwork.org/sites/default/
files/biblio/Walch%20-%20Bitcoin%20Blockchain%20as%20Financial%20Market%20Infrastructure.pdf
13
However, this feature also raises questions regarding governance, i.e., “who dictates and
enforces the rules of the system” (Financial Times 2017).
Although Bitcoin and Ethereum both lack formal decision-making rules, in practice each has
relied on a core group of developers to implement changes to existing protocols, which are
usually made only after a degree of consensus among participants on the network has been
reached. 23 For example, the current protocol for accepting Bitcoin Improvement Proposals
(BIPs) requires agreement by 95 percent of the participants (measured by mining power).
This high threshold is one reason why the Bitcoin community has proven slow to resolve
disputes between stakeholders on the issue of block size. Ethereum has experienced even
more dramatic governance difficulties, most notably involving the “hard fork” related to the
hack and subsequent collapse of the Decentralized Autonomous Organization (DAO). 24
Any organization that chooses to rely on a public blockchain-based solution must accept that
it will have virtually no control over how that system is governed. Given that most of the
solutions examined here involve putting valuable data on a blockchain, it is hard to imagine
the organizations discussed above taking this risk. Instead, they will gravitate towards
solutions that run on permissioned networks, where they can maintain greater (though
perhaps not total) control over rule design and dispute resolution. Even in the case of
permissioned networks, however, there is still a question about how to best design rules to
meet the needs of different participants—and this task becomes more difficult as the
number and variety of participants allowed on the network increases.
Learning
None of these challenges is insurmountable. To address them effectively, development
organizations that consider using blockchain-based solutions must have staff with enough
knowledge of the technology—including its potential benefits and limitations—to provide
reliable guidance. Developing this expertise will require technical training as well as ongoing
dialogue between the development and technology communities. Finally, development
organizations should help to expand the community’s knowledge base by drawing lessons
from both successful and unsuccessful pilot projects. This will involve working with their
start-up partners to collect metrics and publish findings—a point which we return to in the
conclusion.
23
For more on the issue of governance see De Filippi and Loveluck here:
https://policyreview.info/articles/analysis/invisible-politics-bitcoin-governance-crisis-decentralisedinfrastructure; and Angela Walch here: https://www.americanbanker.com/opinion/call-blockchain-developerswhat-they-are-fiduciaries
24 The DAO was essentially an automated venture capital fund run by smart contracts stored on the
Ethereum network. Following its collapse, most participants on the network agreed to participate in a hard fork
that returned stolen ether back to DAO participants. However, a small minority of participants argued that doing
so would raise doubts about the immutability of the Ethereum blockchain. Ultimately, the hard fork went
forward with some purists opting to remain on the earlier version of Ethereum (now called “Ethereum Classic”).
For more detail about the DAO and its collapse, see https://www.cryptocompare.com/coins/guides/the-daothe-hack-the-soft-fork-and-the-hard-fork/ and http://www.coindesk.com/understanding-dao-hack-journalists/
14
This learning process will lead not only to a better understanding of the benefits of the
technology but also its limitations. This includes explicit recognition that the same “human”
constraints that have limited progress in addressing certain development challenges must be
resolved before blockchain technology can help to achieve better outcomes. For example,
like any database, a blockchain is a “garbage-in, garbage-out” system. This means that the
reliability of records stored on it depends entirely on how they are originated. For this
reason, governments that want to use blockchain technology to improve their recordkeeping
systems must often first address underlying issues with how those records are created.
***
Blockchain technology is a powerful new tool. The question is whether it is a tool that has
useful applications in the context of economic development. In part II, we examine the
technology’s potential role in addressing four challenges: (1) facilitating faster and cheaper
international payments; (2) providing a secure digital infrastructure for verifying identity; (3)
securing property rights; and (4) making aid disbursement more secure and transparent.
For each use case, we frame our analysis around three questions:
1. What is the problem that needs to be addressed?
2. Is blockchain technology better at addressing this problem than existing approaches
and technologies?
3. What are the challenges of using blockchain technology in this space and what new
risks might it create?
Table 1: Advantages and challenges of using blockchain technology in four use cases
Use Case
Universal
International payments
Identity management
Land registry
Aid disbursement
Potential Advantages
•
•
•
•
•
•
•
•
•
•
•
Negates the need for trust
Immutability
Transparency
Traceability
Synchronization
Pseudonymity
Facilitates faster and
cheaper payments
Enables user-centric ID
models
Reduces the risk of
expropriation
Makes disbursement
more transparent
Reduces transaction costs
15
Challenges
•
•
•
•
Privacy
Resiliency
Governance
Pseudonymity
•
Liquidity constraints
•
•
•
Requires buy-in from
central authorities
Does not address the
reliability of the records
Requires buy-in from
central authorities
Part II. Potential applications of blockchain technology for
economic development
Facilitating faster and cheaper international payments
The cost and inefficiency associated with making international payments across certain
corridors present a barrier to economic development. Whether it is a business making an
investment in a developing country, an emigrant sending money back home, or an aid
organization funding a project abroad, moving resources from rich to poorer countries
ultimately requires money to be sent across borders. But, as discussed in part I, conducting
these transactions through the formal financial system can involve considerable cost and
delay.
Cross-border payments are inefficient because there is no single global payment
infrastructure through which they can travel. Instead, international payments must pass
through a series of bilateral correspondent bank relationships, in which banks hold accounts
at other banks in other countries. The number of such relationships that a bank is willing to
maintain is limited by the cost of funding these accounts as well as the risk of conducting
financial transactions with banks who lack strong controls to prevent illicit transactions (in
Box 2, we discuss how blockchain technology could help to address the problem of rising
compliance costs associated with preventing illicit finance). Figure II provides an example of
how an international transaction is carried out today via the correspondent banking system.
Figure II
One consequence of the fragmented global payments system is the high cost of remittances,
which are an enormously important source of development financing. Roughly $430 billion
of remittances were sent to developing countries in 2016, nearly three times as much as
official aid (World Bank 2017).
The global average cost of sending remittances worth $200 is 7.4 percent but varies greatly
across corridors: for example, the average cost of sending $200 from a developed country to
16
South Asia is 5.4 percent, while the cost of sending the same value to sub-Saharan Africa is
9.8 percent (World Bank 2017). After falling moderately through the first half of this decade,
these fees have remained nearly flat over the last two years and remain nearly 4.5 percentage
points higher than the Sustainable Development Goals (SDGs) target of 3 percent, despite
concerted efforts by the international policy community to drive prices down (World Bank
2017).
Small and medium-sized businesses face similar costs when conducting cross-border
payments. Industry surveys suggest that approximately two-thirds of cross-border businesses
are unhappy with the delays and fees associated with using traditional bank transfers for
sending international payments (Banking Circle 2016). 25
Several start-ups are developing ways to leverage blockchain technology to lower the cost of
international payments. Some focus on retail remittances, while others focus on business-tobusiness (B2B) payments. Their approaches fall into three broad categories: those that use
virtual currencies as a bridge; those that introduce a distributed ledger between banks; and a
“connector” approach that aims to increase the interoperability of banks’ existing private
ledgers.
Using virtual currency as a bridge
As discussed above, bitcoin is unlikely to ever replace the role of national fiat currencies. But
it, and other virtual currencies like it, can still offer a way to conduct international payments
outside of the correspondent banking system, which several start-ups, including BitPesa,
rebit.ph, and Veem, have sought to take advantage of.
In this business model, the bitcoin-based money transfer operator (MTO) typically takes
payment from a sender in local currency. 26 Then, instead of instructing their bank to send a
bank-to-bank payment to the receiver’s country, the MTO uses the funds received to buy
bitcoin from a seller in the sending country. They then swap bitcoin for local currency at an
exchange in the receiving country before sending this currency to the receiver’s bank, as
shown in figure III. 27
25
This research was conducted amongst issuers, acquirers, payment service providers and merchants.
“Money transfer operator” is the standard term for a company that transfers money across borders on
behalf of retail clients.
27 In reality, payments to and from countries will be aggregated and purchases and sales of bitcoin delayed
such that only net credits or deficits need to be funded, for example at the end of the day.
26
17
Figure III
This approach avoids the correspondent banking system entirely by ensuring that all
transactions take place either within a national payments system or over the bitcoin network,
allowing customers to circumvent the fees charged by banks. The model introduces new
costs of its own however, since transacting into and out of bitcoin to send a payment adds a
third currency and therefore a second foreign exchange swap into each transaction. This cost
varies greatly by corridor, depending on the amount of bitcoin liquidity available in local
markets. In many developing countries, the market for exchanging local currency with
bitcoin is extremely thin, which means that transactions are expensive or occasionally
impossible.
Using a bitcoin-based company to send remittances to countries that have deep bitcoin
exchange markets can be cheaper than using traditional MTOs. For example, sending a $200
remittance from the United States to the Philippines with Rebit.ph currently costs 3 percent,
while World Remit, an established MTO that relies on the traditional system of bank wires,
charges 3.5 percent. 28 However, in most corridors, bitcoin-based remittance companies have
not been able to offer fees that are substantially lower than traditional players. As a result,
many have closed, while others have shifted to emphasizing business-to-business payments
(SaveOnSend 2017).
BitPesa, which was originally one of the highest-profile bitcoin-based remittance providers,
decided to change its business model to provide business-to-business (B2B) transfers after
determining that the profit margins generated by providing remittances to sub-Saharan
28
When Rebit ask for a payment in bitcoin, they redirect users to a bitcoin exchange in their country to
make the purchase. The price described here was calculated using Rebit’s suggested US exchange, Coinbase.
Prices for World Remit calculated using the World Bank’s Remittance Prices Worldwide database (World Bank
2015).
18
Africa were too small. 29 However, competition from legacy operators is stiff in the B2B
sector, as well. For example, while Veem (2015) charges a low, flat 1.9 percent fee for B2B
payments, this rate is similar to the online rates offered by traditional actors like Western
Union and Transferwise for high-value transactions in high-volume corridors (World Bank
2015). In summary, using virtual currency as a bridge for cross-border payments has not yet
had the transformative effect that many once expected.
Using distributed ledgers to enable new cross border payment models
Another, more ambitious way in which blockchain technology could improve international
payments is by replacing the underlying architecture used by banks to conduct cross-border
transactions with distributed ledgers. Start-ups such as Ripple and Stellar have designed
models that could serve this function. Unlike the Bitcoin blockchain, where all transactions
are denominated in bitcoin, users of these systems can conduct transactions in any
currency. 30 Where the preferred currency of sender and receiver differ, the platforms search
for the best exchange rates offered by market makers on the network, as shown in Figure
IV.
Figure IV
The company Circle is taking yet another approach. Building off its original social payments
business model, which allowed users send money (including bitcoin) like a text, the company
unveiled a new open-source application called Spark in December 2016. Instead of creating a
new blockchain platform, Spark adds tools that facilitate regulatory compliance and currency
exchange on top of existing blockchain networks (including the Bitcoin and Ethereum
blockchains), which it uses as a payments rail (Rizzo 2016). Unlike some of its competitors,
Circle charges zero fees for payment services, including remittances, believing that it can
generate sufficient profit by offering other services, including credit, to its customers.
In theory, these models offer the possibility of borderless, currency-neutral transactions
between any pair of jurisdictions that settle in a matter of seconds and involve very low (if
29 Based on material from BitPesa’s website (Lielacher 2017) and comments by BitPesa CEO Elizabeth
Rossiello.
30 Both Ripple and Stellar use their own native digital assets as bridge currencies for transactions. Ripple’s
native digital asset is known as XRP, while Stellar’s is referred to as lumen.
19
any) foreign exchange costs. Ripple has completed several pilot tests with globally active
banks, while the Stellar Network is now being used to provide interoperability between
different mobile money operators in Nigeria, Kenya, and Ghana, and to facilitate remittance
payments to the Philippines, working with remittance provider Coins.ph (2016). Similarly, in
December 2016, Circle announced a partnership between Coins.ph and bitcoin-based
remitter Korbit that would use Spark to create a channel for costless remittances between
South Korea and the Philippines. More recently, the company opened a subsidiary in China
aimed at providing Chinese consumers the ability to send renminbi globally.
If some of these new entrants can gain a foothold in developing markets, they will help to
drive down remittance prices in certain corridors. However, given the high degree of
regulation and government oversight of the financial sector, start-ups operating in this space
must address the privacy, resiliency, and governance challenges mentioned in part I before
widespread adoption of ledger-based payment systems is likely.
The Interledger approach
In the long term, some form of distributed ledger may power a seamless international
payments system. However, Ripple has already decided to go in a different direction. The
company is now focused on an approach called the “Interledger Protocol,” which
synchronizes transactions between banks’ existing private ledgers rather than requiring them
to operate on the same ledger. The solution enables speed and transparency, while
minimizing counterparty risk by using a cryptographically secure escrow system that locks
fund until certain conditions are met (Thomas and Schwartz, 2015).
The approach is attractive to banks because it sidesteps concerns about data privacy,
governance, and resiliency associated with distributed ledger-based systems. For these
reasons, the Protocol has quickly attracted interest from large global banks: Ripple is in
contract with 75 banks for integration and has a consortium of 47 Japanese banks that began
piloting the solution in March 2017 (Rizzo 2017). Ripple is also expanding to developing
countries: In June 2017, Siam Commercial Bank and SBI Remit launched a live commercial
product enabling real-time transactions between Thailand and Japan, where 45,000 Thai
nationals live.
Box 2: Blockchain technology and de-risking
Financial institutions, particularly banks, serve as gatekeepers to the formal economy. For
this reason, national governments have enacted strict regulations about the steps they must
take to verify the identity of their customers, with the aim of preventing criminals, including
money launderers and terrorists, from using the formal financial system. These processes are
often referred to as “know your customer” (KYC) rules.
In recent years, several countries, particularly the United States and the UK, have stepped up
their enforcement of economic sanctions and anti-money laundering and countering the
financing of terrorism (AML/CFT) laws, which has resulted in significantly higher
compliance costs for banks. A recent survey of 300 major financial institutions, including the
20
world’s largest banks, conducted by Thomson Reuters suggests that global banks now spend
an average of $60 million a year on KYC compliance (Thomson Reuters 2016).
In response, some large banks have exited relationships with whole categories of clients,
including smaller banks in countries perceived to be risky, because they view the risks as
outweighing the (often very small) potential return. This phenomenon, which is commonly
referred to as “de-risking,” hurts the worlds’ poorest since it disproportionately affects
organizations working in poor countries, including money transfer operators that facilitate
remittances, charities that provide humanitarian services, and local banks. 31
One of the reasons that KYC compliance costs are so high is that the processes of
requesting documents, verifying them, and cross-checking identities against lists of persons
of concern are often time-consuming. Even worse, once a customer has completed a KYC
check at one bank, other financial institutions cannot rely on that bank’s verification that the
customer is who she says she is. Instead, the entire process must begin again every time the
customer seeks to interact with a new institution, or even sometimes a different part of the
same bank.
Blockchain technology has been touted as a potential solution to the high costs of client
identification. Start-ups such as KYC Chain and Tradle have developed platforms that allow
customers to record KYC verifications in a “digital wallet” stored on a distributed ledger and
then share that information with other financial institutions when requested. 32 This approach
could reduce duplication of effort by both the customer and the institutions.
It is unclear though whether a distributed ledger-based approach is necessary or desirable for
sharing KYC data. For example, SWIFT’s KYC Registry, which a large and increasing
number of banks now use, runs on a centralized database. 33 The SWIFT registry requires
participating institutions to provide KYC information in a standardized form that can be
shared with other participants (SWIFT 2015). However, the data stored on the registry
currently focuses on characteristics of the banks themselves rather than their customers.
While this information can help to facilitate the creation and maintenance of correspondent
bank relationships, it does not address the costs associated with redundant KYC requests at
the customer level.
Stringent privacy laws may make it impossible to create a centralized repository like the
SWIFT KYC Registry for customer data. However, distributed ledger-based solutions may
be able to sidestep this constraint by giving control over which institutions can access KYC
information to the customer. Tradle calls this the “customer as a platform” model and it is
similar to the user-centric ID models discussed in the following section (Tradle 2016). For
31 See the CGD report on the Unintended Consequences of AML/CFT Enforcement
https://www.cgdev.org/sites/default/files/CGD-WG-Report-Unintended-Consequences-AML-Policies2015.pdf
32 See KYC Chain here: https://kyc-chain.com/; and Tradle here: https://tradle.io/.
33 SWIFT is a member-owned cooperative of financial institutions that provides messaging services to more
than 11,000 banks around the globe.
21
these models to work, however, regulators would first need to decide that they are willing to
allow financial institutions to rely on the client verifications made by one another.
The solutions outlined above aim to improve how the financial sector conducts AML/CFT
by tinkering at the margins of the existing system. However, blockchain technology could
lead to a much more fundamental change in the way financial supervisors and institutions
cooperate to combat illicit finance, if policymakers have the appetite to redesign the
AML/CFT system from the ground up. 34
For example, one could imagine a scenario in which all financial transactions in a system are
conducted over a distributed ledger, with each transaction linked to customer’s unique digital
ID. These transactions could be encrypted so that only the financial institutions and
customers involved in a transaction have immediate access to the underlying data, but
financial supervisors could be granted access (in the form of a cryptographic “master key”)
in cases where a subpoena is issued to investigate suspicious transactions. Supervisors could
also monitor (anonymized) transaction flow on the network in real-time to spot suspicious
trends taking place across institutions using new approaches for analyzing big data. Such a
system would take years to develop and almost certainly raise concerns about government
overreach, but it could appeal to both financial supervisors and financial institutions, who
are eager to find ways to improve coordination and data-sharing.
Providing a secure digital infrastructure for verifying identity
Globally, 1.1 billion people, or roughly one in every seven, lack proof of their legal identity.
This problem disproportionately affects children and women from rural areas in Africa and
Asia, and is even more acute for the world’s more than 21 million refugees (World Bank
Group, 2017) (United Nations High Commissioner for Refugees 2017). In 2015, the World
Bank estimated that “some fifty thousand Syrian refugee children have been born abroad
and over 70 percent of them have not been registered at birth, making it almost impossible
for them to prove their citizenship later on.” (Dahan and Edge 2015) Without legal
identification, it can be difficult to access health and education services, open a bank
account, get a loan, and even vote (World Bank Group and Center for Global Development
2017). For that reason, people who lack a legal ID struggle to fully integrate into society and
achieve their economic potential.
Recognizing that effective identity schemes are crucial for development, the Sustainable
Development Goals (SDGs) set a target of providing legal identity for all, including birth
registration, by 2030. To help meet this target, the development community has coalesced
around a set of 10 principles that ID systems should meet. These principles, which were
facilitated by the World Bank and the Center for Global Development and have been
endorsed by 19 organizations so far, include ensuring universal coverage from birth to death,
34
Juan Zarate and Chip Poncy of the Financial Integrity Network provide recommendations about what a
new AML system should include here: https://www.theclearinghouse.org/research/2016/2016-q3-bankingperspectives/a-new-aml-system
22
providing an identity to individuals that is unique, secure, and accurate, and protecting user
privacy (World Bank Group and Center for Global Development 2017).
Existing solutions
At its core, the challenge of providing a legal ID to all citizens is one of political willingness
and state capacity. 35 However, new advances in digital technology and biometrics (including
iris scanning, facial recognition, and voice pattern recognition) make it easier and cheaper for
governments to provide secure digital IDs. There are also clear benefits associated with
moving from a paper-based to a digital ID system, since digital records are less prone to loss,
tampering, and degradation. As the share of services and economic transactions conducted
online increases, the rationale for providing a digital solution becomes even stronger.
Several countries, including Estonia, India, Pakistan, Peru, and Thailand, have adopted
digital ID systems in recent years. Estonia was the first country to embrace a fully digital ID
framework and it now has the most advanced national ID system in the world. The system
uses public key cryptography to bind information about each Estonian citizen, including a
unique 11-digit national ID number, to a public-private key pair associated with a national
ID card. Estonians can use this card to perform a wide variety of functions both in the “real
world” and online, including as a national ID card for travel within the EU, a national health
insurance card, proof of ID when logging into bank accounts, a digital signature, and for
accessing government databases to check medical records and file taxes (e-Estonia 2017).
Estonians can also use the card to cast votes in the country’s elections from any internetconnected computer anywhere in the world.
India’s digital ID system, popularly known as “Aadhaar,” is the world’s largest biometric ID
project. Established in 2009, the Indian government has already registered more than 1.14
billion of its 1.2 billion citizens. Under the program, each Indian citizen is issued a unique
12-digit number that is connected to their demographic and biometric data. By providing
their Aadhaar number and a biometric marker (iris scan or fingerprint), Indians can quickly
and securely identify themselves to access a variety of government services, including direct
cash transfers for food subsidy, cooking gas, and government-sponsored scholarships, as
well as pay taxes online. India’s Ministry of Finances estimates that the program has already
saved the government roughly $530 million through improved social service targeting and
reduced leakage, though these estimates are debated (ET Bureau 2017).
What’s wrong with existing solutions?
In both the Estonian and Indian cases, as well as the other national ID schemes mentioned
above, governments store citizens’ ID information on a centralized database. Given that
these systems appear to be efficient and secure, is there any real need for using a blockchain-
35
It is useful to distinguish between legal ID and digital IDs. Essentially, legal IDs are officially recognized
IDs that are usually (but not always) associated with legal status, while digital IDs are simply those provided
through digital means.
23
based approach? 36 In the case of state-authorized IDs, the answer may indeed be “no.” While
centralized ID repositories have some flaws—including vulnerability to hacking—it is
difficult to imagine governments agreeing to relinquish absolute control over these systems.
However, blockchain technology could play a role as a platform for digital IDs more
broadly. To understand why, it is useful to first review the challenges associated with online
identification and current approaches to solving them.
In a frequently cited 2005 paper, Kim Cameron, then chief identity architect for Microsoft,
wrote that that the Internet “was built without a way to know who and what you are
connecting to” (Cameron 2005). In other words, the internet lacks an “identity layer.” While
the internet’s inherent anonymity can be useful in some situations (e.g., participating in
discussions on sensitive topics and political activism), in others it is a hindrance that forces
online users to prove their identity using a series of workarounds or “identity one-offs.”
In most cases, users who want to gain access to websites or e-services that require
identification must provide a set of personally identifying information (e.g., name, address,
driver’s license, mother’s maiden name) to the company or organization that operates them.
That information is linked to a user ID and password and stored on the company’s database.
The result is a headache for users who must juggle different passwords for multiple websites
and a massive security risk, since each database serves as a honeypot for would be hackers.
This approach is often referred to as a centralized solution since it relies on centralized data
to establish identity.
A second approach that has become more popular in recent years is a federated solution, in
which users provide identifying information to a single authorizing entity, which can then
verify their identity to any website or application (anytime you use a Facebook or Google
login to access a website, you are relying on a federated solution). This simplifies the user
experience and enhances privacy by allowing users to log into many services using one set of
credentials, rather than providing the same information to multiple entities. The key
vulnerability associated with the approach is that individuals’ data remains under the control
of the authorizing entity, and any change to that data (either through deletion or tampering)
affects users’ ability to access other services.
36
There are reports that data of 130 million Aadhaar cardholders had been leaked from four Indian state
government websites, but it appears that only public information (including Aadhaar numbers) was posted. The
Indian government has responded by enhancing the system’s privacy and encryption requirements.
24
Figure V
User-centric ID systems built on blockchain technology
Because of the weaknesses of centralized and federated ID solutions, and the belief that
people should have greater control over their own personal data and the value derived from
it, some ID experts have turned their focus to developing “user-centric” or “self-sovereign”
systems. These systems aim to shift control to individuals by allowing them to “store their
own identity data on their own devices, and provide it efficiently to those who need to
validate it, without relying on a central repository of identity data” (Lewis 2016). Until
recently such a solution seemed technically infeasible, but blockchain technology appears to
make it possible.
Initial discussions about how to use blockchain as a platform for digital ID focused on the
idea of storing personal data directly on the network. However, it quickly became clear that
doing so would create significant cybersecurity risks (because sensitive data would be shared
widely) and face tough regulatory hurdles (because national data privacy rules often prevent
sharing personal data across borders). 37 Instead, thinking has evolved towards a model in
which individuals use a digital wallet on a blockchain to store certifications from trusted
authorities asserting that they possess certain attributes (e.g., “is a US citizen,” “is over the
age of 18,” “is over the age of 21”).
37
This is the case even when personal data is encrypted.
25
In the generic model, each person (here, “Alice”) is provided with an “identity wallet” that
they can access from their mobile phone and that is associated with a cryptographic
public/private key pair. 38 The public key functions as Alice’s ID number, while the private
key serves as her password and digital signature. Alice uses her wallet to store documents
digitally signed by trusted authorities (e.g., banks, credit rating agencies, hospitals, passport
authorities) certifying her attributes. For example, Alice could store the following certified
claims in her wallet: “credit rating over 700,” certified by a bank or credit rating agency; “has
a US passport,” or “is over 21,” certified by a government; “has blood type B” certified by a
hospital or doctor. When Alice must show that she has certain attributes to service providers
(e.g., when she needs to prove that she is older than 21 to enter a bar; or that she has a credit
rating above 700 to obtain a loan), she can share them without sharing any additional
personal information.
Several benefits arise from storing certified attributes on a blockchain. The first is privacy:
Alice can control both who she shares her personal information with and how much
information she shares. The second is security, as the absence of a centralized database
eliminates single point of failure risk. 39 The system is also more convenient, since it allows
users to provide verified information with the touch of a button rather than having to access
and submit a wide variety of documents. Finally, a blockchain provides an easy and accurate
way to trace the evolution of ID attributes since each change is time-stamped and appended
to the record preceding it.
The idea of a self-sovereign ID system based on blockchain is close to becoming a reality.
For example, SecureKey and IBM are now piloting a digital ID system in Canada using the
Linux Foundation’s open-source Hyperledger Fabric blockchain (SecureKey 2017). The
project connects the Canadian government (including national and provincial government
agencies) with the country’s largest banks and telecoms on a permissioned blockchain
network. These participating companies and agencies play a dual role of certifying users’
attributes and providing digital services. The project is expected to go live in late 2017, at
which time Canadian consumers will be able to opt into the network to access a variety of egovernment and financial services by sharing verified attributes stored on a mobile phone.
For another use case for a user-centric ID system, see box 2 on blockchain technology and
de-risking.
Are there development benefits to a user-centric approach?
While the benefits of the user-centric model are obvious in theory, it is uncertain whether
the promised gains in convenience, control, and privacy will be enough to attract customers.
A more fundamental question for this paper is whether a user-centric model could help to
improve the lives of the world poorest. The start-ups working in this space, including the
companies BanQu and Taqanu and the non-profit Sovrin Foundation, certainly think so. All
38 Much of the description below comes from Antony Lewis’s excellent Bits on Blocks blog.
https://bitsonblocks.net/2017/05/17/a-gentle-introduction-to-self-sovereign-identity/
39 This benefit can be overstated, however, since certifying authorities still must store the underlying data
used for verifications on their databases.
26
three are developing blockchain-based ID approaches aimed at providing digital IDs to
those who need them most, including the world’s poorest and refugees. 40
Because of their statelessness and high reliance on NGO-provided services, refugees could
benefit greatly from having access to a secure and easy-to-use digital ID that could be used
to access those services and build a credit profile. The United Nations High Commissioner
for Refugees (UNHCR) has spent the last several years developing a digital ID system for
refugees with the aim of meeting three objectives: (1) rapidly determine what benefits and
services a person needs; (2) provide secure identities; and (3) improve documentation to help
long-time refugees find permanent solutions. 41 UNHCR determined that these objectives
could be met using a centralized solution developed by Accenture, which they are now
rolling out (Accenture 2017). More recently, however, Accenture and Microsoft announced a
prototype for a digital ID network that uses blockchain technology and runs on top of the
UNHCR ID management system (BBC News 2017).
The key challenge for any user-centric ID system is that key central authorities must buy into
the system for it to be effective. This is particularly important when the goal is to improve
the lives of the poor, since most of the services they rely on are provided by national
governments. Without government approval and participation, ID systems will not fulfill
their promise. The same relationship holds true for international organizations and refugee
populations. It is difficult to see how a user-based ID system aimed at helping refugees can
be effective without UNHCR participation.
The issue is one of network effects: the benefit derived from being able to verify attributes
to organizations on a permissioned network depends entirely on the services those
organizations provide. If those services only satisfy a small portion of a person’s needs,
which is likely to be the case if the authorities mentioned above do not participate, then the
value of a user-controlled ID is limited.
As with the aid distribution use case discussed below, it is too early to predict whether
blockchain-based ID models will take hold in the market. While the appeal of a user-centric
approach is clear to many technologists, it must be demonstrated to the institutions and
customers whose buy-in is necessary for success.
40
Banqu’s website states that it “provides a platform where refugees, the displaced, and the world’s poorest
can maintain a free, secure online profile that provides them with a universal fiscal ID and allows them to begin
tracking their relationships and transactions. Over time, they build a recognizable, vetted identity, which is the
base prerequisite to participating in any form of ownership or transactions in the global economy” (BanQu 2017).
41 While a UNHCR-provided ID could help to consistently identify a refugee against a baseline of who the
refugee says he/she is when an ID is issued, it may not be able to verify who the refugee “really is,” if it does not
have access to (or trust in) the registries of the refugee’s home country.
27
Securing property rights
Land is an important asset for the rural and urban poor.42 However, many developing
countries lack a system of clear and enforceable property rights, which prevents them from
making full use of this asset. Oftentimes, claims to land will be recognized by a local
community but not by the government. For example, the World Bank reported in 2013 that
more than 90 percent of Africa’s rural land remains undocumented and it estimates that 70
percent of the world’s population lacks access to proper land titling (Heider and Connelly
2016).
Helping governments improve their property rights regimes has been high on the global
development agenda for some time. Since 2004, the World Bank has collected data on the
quality of a country’s land administration for its Doing Business indicators. The indicator
measures performance across five dimensions: reliability of infrastructure, transparency of
information, geographic coverage, land dispute resolution, and equal access to property
rights.
The quality of a country’s system of property rights reflects its ability and willingness to
create and maintain trustworthy records. This trustworthiness in turn reflects the perceived
reliability and authenticity of those documents: a record is reliable if it accurately represents
the facts to which it attests, and authentic if it has not been tampered with or corrupted (i.e.,
it is the record that it claims to be). 43
The idea of storing land titles on a blockchain has obvious appeal. Most importantly, sharing
a land registry across a distributed network greatly enhances its security by eliminating
“single point of failure” risk and making it more difficult to tamper with records. It could
also increase transparency by allowing certified actors (including, potentially, auditors or
non-profit organizations) to monitor changes made to the registry on a near real-time basis,
and enhance efficiency by reducing the time and money associated with registering property.
A blockchain cannot, however, address problems related to the reliability of records. This is
an obvious point but one that is often overlooked. As noted earlier, the blockchain is a
“garbage in, garbage out” system: if a government uploads a false deed to a blockchain
(either out of carelessness or deceit), it will remain false.
This suggests that using the technology to store land records works best in places where the
existing system for recording land titles is already strong. This was certainly the case in
Georgia, which initiated a project with The Bitfury Group and the Blockchain Trust
Accelerator in 2016 to register land titles on a blockchain. Even before the project began, the
country’s land registry was ranked the third best in the world by the World Bank.
42 See Deininger (2003) here:
http://documents.worldbank.org/curated/en/485171468309336484/pdf/multi0page.pdf
43 This paragraph relies heavily on Victoria Lemieux, Trusting Records: Is Blockchain Technology the
Answer? http://www.emeraldinsight.com/doi/pdfplus/10.1108/RMJ-12-2015-0042
28
As noted by New America’s Michael Graglia, Georgia was an ideal testing ground for several
reasons: First, when Georgia became independent from the USSR in 1991, it had virtually no
official property records, so it only had 26 years’ worth of records to digitize when it started
the pilot (Kelley and Graglia 2017). Second, Georgia had already received significant
assistance and funding from the World Bank and other international organizations to
modernize and digitalize its property management system. Finally, the ever-present threat of
a Russian incursion provides the government a strong incentive to create a tamper-resistant
record of ownership.
The approach taken by Bitfury in Georgia involves the use of two blockchains, one private
and one public. In the first stage, Georgia’s National Agency of Public Registry (NAPR)
uploads digitized land titles onto a private, permissioned blockchain that only a small set of
known computers can access. In the second, NAPR creates a unique cryptographic code
(known as a “hash” and discussed in more detail in the appendix) for each document and
then anchors this code on the Bitcoin blockchain. The public blockchain effectively
functions as a notary, timestamping both the initial upload and any subsequent changes to
the hash triggered by modifications of the underlying land title.
Bitfury’s pilot project in Georgia has reportedly been a success. By February 2017, NAPR
had registered more than 100,000 documents and the Georgian government announced a
new agreement with Bitfury to expand the use of blockchain technology to other
government departments. The question now is whether this success can be replicated in less
favorable environments. Bitfury will face this challenge in Ukraine where it recently reached
agreement with the Ukrainian government to put all its electronic records (not just land
titles) onto a blockchain.
The case of Honduras indicates that the road ahead may be more challenging in some
countries. In 2015, the Honduran government appeared to agree to conduct a wellpublicized pilot with the start-up Factom to store land titles on the firm’s proprietary
blockchain, but the project stalled within months. Even in Sweden, an advanced economy,
the transition to using a blockchain for land registry has proven more difficult than in
Georgia. There the challenge has been modernizing the country’s laws to create a regulatory
structure that can support the use of digital records and blockchain (Graglia 2017). One of
the main sources of delay has been designing a law that would give legal standing to digital
signatures. Although the process has been slower than in Georgia, there is little reason to
believe that it will not be successful once an appropriate regulatory regime has been put in
place.
The question facing governments is under what conditions the transparency and efficiency
gains created by moving from a centralized land registry to a blockchain-based system
outweigh the costs of transition. These costs will be particularly high for governments that
have not yet digitalized their records. The benefits will also vary by country. Paradoxically,
those countries with less credible property rights systems, which have the most to gain from
using a blockchain, will also have the hardest time using it effectively. For this reason, the set
of countries willing to make the switch may be limited. This prediction is, however, belied by
29
reports from Bitfury staff that a number of governments have expressed interest in
conducting their own pilot projects.
A second group of questions relates to who holds the data and how the arrangements are
financed. To date, start-ups working on land registry have shared few technical details
publicly about the agreements they have reached with governments. One area of concern is
what it means for valuable public information to be stored on private servers. One can
imagine a worst-case scenario in which, over time, as a government continues to upload
valuable information to a private server, the company that owns the server will see its
negotiating power increase, allowing it to charge increasingly higher prices for use of its
service (a risk often referred to as “vendor lock-in”). However, none of these technical and
design-related challenges are likely to be insurmountable.
Securing other valuable property on a blockchain
The same features that make blockchain technology an appealing option for storing land
records pertain to other valuable assets as well. And innovators have taken advantage of the
immutable nature of a blockchain by using it to create, store, and exchange tokens that
digitally represent claims on an underlying physical asset. Rather than relying on paper
invoices and certificates of authenticity that can be manipulated or lost, storing asset-backed
tokens on a blockchain makes it easy to see an asset’s provenance and track its movement,
enhancing transparency and preventing fraud. This is particularly important when dealing
with valuable goods that are prone to theft.
A good example of this approach is provided by the company Everledger, which provides a
platform to digitally certify diamonds traced through the Kimberley Process certification
process. The Kimberly Process, which started in 2000, now has 81 signatory countries but its
effectiveness has been hampered by the fact that, until recently, certification for diamonds
was done only on paper, which created opportunities for fraud. 44 Everledger makes it easier
to verify a diamond’s provenance by allowing industry actors to originate and store digital
diamond certificates on a blockchain in an approach that involves three steps. First, the
system generates a uniquely identifying “thumbprint” for a diamond by referencing 40
different characteristics for each gem, including details of its cut, carat, and color, as well as
high definition photographs of a laser-inscribed serial number on its girdle. Next, this
information is uploaded to a private blockchain that runs off of Hyperleder Fabric. In the
last stage, a cryptographic hash of the underlying data is anchored on the Ethereum
blockchain.
Using a blockchain to help track the provenance of goods is a promising use case and one
that could be applied to any type of rare and valuable good, including artwork and even rare
earth materials. As with land titling, the greatest challenge for using a blockchain for this
purpose relates to how a certificate of ownership is originated (i.e., its reliability). It is
essential that the system for assigning that ID is transparent and that the underlying physical
44
For a dramatic example of diamond certification fraud, see
https://www.youtube.com/watch?v=Yvatzr7pA70
30
assets have one or more identifiers that are difficult to destroy or replicate, which allows
them to be assigned a unique identifier (Crosby et al. 2015).
Making aid disbursement more secure and transparent
Critics and even proponents of the current system of development aid frequently claim that
it is riddled by corruption and leakage. In 2012, then UN Secretary-General Ban Ki-moon
stated that corruption prevented 30 percent of all development assistance from reaching its
destination (UNSG 2012). Similarly, in 2017, US Senator Rand Paul (R-Ky) claimed that 70
percent of US development aid is “stolen off the top” (Wolverton II 2013).
These assertions appear to have no basis in fact but policymakers feel comfortable making
them because estimates of the amount of aid lost to corruption are highly uncertain. Of
course, measuring corruption is inherently difficult because those who profit from it have a
strong motive to conceal their actions. This difficulty is compounded by the fact that
development organizations have historically done a poor job of monitoring the flow of the
money they spend, as well as the results they achieve. The problem is particularly acute in
areas where multiple donors assist the same population.
Recent attempts to measure the effect of corruption on aid indicate that the problem may be
much smaller than generally believed. For example, while the World Bank found evidence of
sanctionable corruption and fraud in 157 projects worth $245 million in the period 20072012, that number represents a mere 0.1 percent of the World Bank’s total average lending
of $40 billion a year (Alexander and Fletcher III 2012). 45 While this measure almost certainly
underestimates the amount of funding that the World Bank has lost to corruption, since it
only accounts for instances of wrongdoing that have been detected, it does give a sense of
how off base more alarmist estimates may be.
Regardless of the accuracy of estimates, the reality is that aid lost to corruption is a hotbutton issue for policymakers, who, for good reason, do not want taxpayer money to end up
in the pockets of corrupt actors in other countries. This issue will become even more
prominent in the future, as development agencies direct a greater share of aid towards
conflict and post-conflict countries where most of the world’s poorest now live. These
countries are particularly susceptible to corruption and fraud because monitoring is more
difficult, institutions are weaker, and options for procurement are more limited.
Reducing the risk that aid will be misappropriated requires greater transparency, which in
turn requires agencies to better monitor and report project data, including information about
ongoing and planned activities, financial flows, and evaluation metrics. Publicizing this data
is important because it allows citizens and watchdog groups to hold aid providers
accountable.
45
Our colleague Charles Kenny makes this point here: https://www.cgdev.org/blog/how-much-aid-reallylost-corruption
31
Greater transparency also facilitates better coordination among donors. Over 21 multilateral
organizations and 45 countries provide official development assistance, often to the same
population (Lawson 2013). These donors all have their own “projects, programs, interests,
priorities, concepts, conditions, administrative structures and procedures,” which imposes
burdens on recipient countries, who have to negotiate with each donor individually (German
Development Institute 2004). Given the sheer number of actors, it is unsurprising that a
2000 World Bank survey suggested that as much as half of senior bureaucrats’ time in
African countries was spent dealing with requirements of the aid system (Sundberg and Gelb
2006). Likewise, it is understandable that policymakers in some developing countries have
enforced “quiet” periods in which donors are asked not to send delegations so they can
focus on domestic matters.
At first glance, increasing transparency seems like a win-win as it both reduces opportunities
for corruption and makes aid more efficient. However, transparency also comes at a cost,
since it requires donors to divert resources from carrying out their primary, substantive goals
towards recording and reporting information to the public. The question is whether this
tradeoff between transparency and efficiency is unavoidable or a function of donors’ reliance
on outmoded approaches and systems.
A number of start-ups are exploring how blockchain technology could help improve the
transparency of aid while also making it more efficient. To date, ideas about how best to do
so have coalesced around two models: in the first, data about project funding and metrics are
shared across participants on a blockchain; in the second, aid payments are conducted
directly on a blockchain in the form of tokenized cash or vouchers. 46
An example of the first model is an application called Stoneblock developed by the company
Neocapita. Still in an early stage of development, the platform will allow actors along the
development supply chain (including donors, recipients, implementing partners, and
auditors) to simultaneously track information about how a project is progressing and the
flow of funding. The company is also exploring the use of smart contracts that would trigger
disbursement of funds tied to performance metrics. In most cases, human observers would
report metrics onto a blockchain (e.g., reporting the number of children attending a school)
but in others, electronic meters could play the same role (e.g., measuring the amount of
water produced by a well).
By allowing all participants on the network to view the same information at the same time,
using a blockchain to share project data could dramatically reduce administrative overhead.
Storing records on a blockchain would also make them essentially tamper-proof, thereby
reducing the potential for misappropriation.
The second model involves using a blockchain as a platform for providing aid in the form of
cash-based transfers or vouchers. In many cases, cash transfers have proven to be a more
efficient tool for alleviating poverty than in-kind transfers (e.g., food and household items)
46
Vouchers are simply credits that must be spent on specific goods and services from certain vendors.
32
(Blattman et al. 2017). This is in part because recipients are better than donors at
determining their own needs and in part because it is easier to distribute cash than goods—
particularly when cash is moved digitally.
Several start-ups, including UK companies Aid:Tech and Disberse, are in the early stages of
piloting methods that use a blockchain to conduct such transfers. While their approaches
differ slightly, in each case, donors exchange funds denominated in national fiat currency for
digital assets stored on a blockchain, either in the form of tokenized money or vouchers.
Donors and other participants on the network can then track these tokens as they flow to
intended beneficiaries, who are distinguished by some form of digital ID (which is often
linked to the individual through biometrics).
From the perspective of donors, conducting aid payments on a blockchain provides three
key advantages: speed, enhanced transparency, and the ability to bypass traditional financial
intermediaries. As discussed, banks and MTOs often charge high fees for cross-border
transactions. While using a blockchain does not remove the need for a foreign exchange
transaction in cases where money is sent across borders, it does give greater control to
donors over who they can exchange with. Companies working in this space report that
alternative liquidity providers can offer significantly better foreign exchange rates than
traditional actors.
Although the pilot projects conducted so far have been small, initial reports have been
encouraging. For example, using Disberse’s platform to distribute funds to both local NGOs
and schools in Swaziland, the UK charity Positive Women reduced its transaction costs by
2.5 percent, allowing it to provide a year’s worth of schooling for an additional three
children.
The UN’s World Food Programme (WFP) also recently conducted a successful pilot project
in Jordan, where it used an Ethereum-based blockchain to manage cash-based transfers to
10,000 Syrian refugees living in the Azraq camp in Jordan (De Silva 2017). Per WFP staff,
the project has increased transparency and dramatically reduced costs. Whereas the WFP
pays Jordanian banks a fee of 1.5 percent to facilitate cash transfers, the fee to conduct
transfers via the blockchain is nearly zero. The organization hopes to expand the pilot to
cover all WFP beneficiaries living in camps in Jordan by November 2017 (adding 100,000
people) and all beneficiaries living in communities (an additional 400,000 people) by January
2018. The WFP estimates that, once the pilot is fully scaled up, it will pay only $150 in
monthly financial service fees, compared to $150,000 today.
To date, each of the pilots has involved only a single donor or agency. However, the real
promise of using a blockchain to distribute aid is the potential for coordination across
multiple donors. Sharing information across multiple organizations, including not only
donors but also partner governments, auditors, and potentially even beneficiaries on a single
platform, could make aid distribution more efficient in several ways (OECD 2003). First, it
could help to prevent unnecessary duplication of effort by donors and partner governments.
Second, it could promote greater harmonization of procedures by revealing areas where
donors are asking for similar information from governments but have different reporting
33
standards. Finally, it would allow partner governments to better integrate aid into their
budget decisions.
Despite these potential benefits, moving from pilot projects to scale will be difficult. A key
challenge is the inherent nature of development organizations, which like most large
bureaucracies, tend to be risk-averse and slow to innovate. This stance is sensible since these
organizations act as stewards of other people’s (and country’s) resources and the services
they provide can mean the difference between life and death for beneficiaries. Even though
these agencies often support development-related innovation through special departments
and initiatives (e.g., DFID’s Innovation Hub, USAID’s Innovation Lab), convincing them to
shift from the legacy systems they use to distribute aid to a blockchain-based one will be a
much harder sell given the concerns about governance and operational resilience raised in
part I.
Data privacy is also particularly important in the case of aid distribution since beneficiaries
are, almost by definition, members of a vulnerable population and their vulnerability is often
due to political persecution. For that reason, storing and sharing sensitive personal
information about them must be done with great care. This is not an insurmountable
problem, and the health care sector provides a good model of how to deal with sharing
sensitive information across organizations. But the startups working in this space will need
to confront the issue more explicitly before aid providers may be willing to invest in the
solutions proposed.
Finally, there is the reality that, whatever technology is used, the decision for donors to share
data with one another—and then to make use of that data—is ultimately a question of
political willingness. The development community has long recognized the importance of
donor coordination, but progress in that direction has been slow. A recent, positive step was
the creation of the International Aid Transparency Initiative (IATI) in 2008 and the
commitment by over 500 organizations to publish data that conforms with the IATI
Standard. 47 However, there is no evidence that the initiative has changed outcomes on the
ground yet and critics have argued that the data is published too infrequently and is of too
low a quality to be useful (Castell 2015; Ingram 2014).
Concluding thoughts
The future of blockchain technology as it relates to economic development is difficult to
predict due to its short track record. Most of the projects discussed here are either in a beta
testing stage, midway through an initial pilot, or have just completed a pilot. We know that
the technology is effective at enabling secure virtual currencies, but it is still too early to tell
whether other applications will have staying power. While blockchain technology
47
Under IATI, aid providers publish standardized information about their activities to a public registry,
making it easy for outside parties to see and (in theory) use. The 500 organizations that now publish IATI data
include DFID, USAID, WHO, and the World Bank, representing a total of $146 billion of funds in 2016
(International Aid Transparency Initiative 2017).
34
proponents tend to assume that centralized solutions are always “second best,” this may not
be the case. The most likely outcome is that the frenzy of interest in blockchain-based
solutions will evolve in the same manner as the dotcom bubble, with most companies failing
to achieve liftoff and a select few creating business models that transform the sectors they
operate in.
Before drawing wider conclusions, it is useful to distinguish between cross-border payments
and the three other use cases (aid distribution, land registry, and ID platform). In the former,
assuming a supportive regulatory environment, the market will decide the fate of competing
models and the verdict will be relatively swift, as competition forces out less profitable
companies. In the latter, success depends on getting buy-in from the governments and
international institutions that will put the technology to use. We focus our comments on
these cases.
We expect that going from pilot projects to scale will take longer than many realize, as these
organizations grapple with challenges related to data privacy, operational resiliency, and
governance. At the same time, these organizations must work closely with government
agencies and financial regulators to ensure that the legal and regulatory environment
supports the use of blockchain-based solutions (Edwards 2017). Governments can also play
an important role in helping to provide the necessary precursors for using the technology,
such as high-speed Internet, widely available smartphones, and reliable energy access
(Nelson 2016).
Finally, the development and technology communities should work towards a set of
principles and standards for using the blockchain-based solutions in the context of
development. 48 While it may be counterproductive to set standards now, given the rapid
pace of innovation, it is important to have conversations with an eye towards what these
standards might look like in the future to prevent different organizations from developing
systems that are ultimately incompatible.
These challenges are all solvable. Whether development agencies and organizations choose
to invest the resources necessary to solve them will depend on two factors. First, there must
be sufficient appetite to address the underlying development challenges. Second,
organizations must believe that the benefits of shifting from legacy systems to blockchainbased ones outweigh the risks—and this hurdle will be high since this shift will usually
require wholesale rather than incremental change.
The onus is on the technologists working in this space to make the case that the solutions
they offer provide significant advantages over existing approaches. However, an absence of
quality data may hamper their ability to do this. While start-ups have been quick to publicize
pilot “successes,” they rarely, if ever, report metrics to support these claims. That reticence is
48
The Principles for Digital Development, which have been endorsed by over 100 organizations working in
international development, provide a useful model for this effort. See http://digitalprinciples.org/
35
understandable given the stiff competition for funding and market share, however it
undermines the broader effort to design effective solutions.
The government agencies and international institutions that partner with start-ups on pilot
projects have an important role to play in collecting and reporting project data that could be
used to improve existing approaches. In the absence of this data, the development
community’s ability to discern what approaches are most likely to work and, in turn, decide
where investments should be made, will be limited.
***
As economic historian Nathan Rosenberg has emphasized, most major innovations enter the
world in a primitive condition and go through a long process of technical improvement and
change before reaching maturity (Smith et al. 2003). For that reason, even inventors
themselves often cannot foresee how their innovations will ultimately be used. Blockchain
technology is likely to evolve in a similar fashion through a lengthy period of trial and error.
Continued dialogue between the development and technology communities and a focus on
evidence-based learning will help steer this process in the right direction.
36
Appendix: proof of work
The aim of the proof of work mechanism is to build consensus across a group of actors who
have no reason to trust one another about the validity of a transaction. 49 To understand how
the process works, consider a transaction between Alice and Bob carried out on the Bitcoin
network. Alice wants to buy a widget costing 30 bitcoin from Bob, the world’s preeminent
widget maker. 50 She has 50 bitcoin in her wallet. To initiate the transaction, Alice sends a
message to all the nodes (or computers) on the Bitcoin network informing them of her
intent to send 30 bitcoin to Bob, send 18 bitcoin back to herself, and use the residual 2
bitcoin as a transaction fee. She signs this message with a digital signature that is
cryptographically linked to her public bitcoin address (essentially, her bitcoin wallet).
To validate the transaction, the nodes on the network need to verify that (1) Alice is who she
says she is and (2) she has the bitcoin that she claims to have. A node can verify this
information easily with Alice’s digital signature, and the record of all previous transactions.
The network needs to reach consensus in a way that prevents cheating. At the most basic
level, it must prevent Alice and her cronies from taking over more than 50 percent of the
nodes on the network and using that power to fraudulently verify cases of double-spending.
The Bitcoin protocol prevents this from happening by requiring nodes to earn the right to
verify transactions by solving a computationally intensive puzzle. Because the hash function
produces a random output, there is no way to use mathematical properties or patterns to
discern the input from the provided output. Therefore, the only way the puzzle can be
solved is through raw computational power. This property of the puzzle ensures that every
computer (also called a “node”) has an equal and arbitrary/random chance of solving the
puzzle. The rationale is that, by requiring a significant amount of computational effort, it
becomes essentially impossible for any one participant to overpower all the other “honest
nodes” on the network.
To understand how this puzzle is solved, it is useful to understand a bit about cryptographic
hash functions, which are the workhorses of the proof of work. A hash function is simply a
mathematical transformation (or set of transformations) used to codify an input of arbitrary
length (“the message”) into an output of a fixed length. In the Bitcoin blockchain, a
cryptographic hash function called SHA256 is used to generate a 256-bit length output (the
“digest” or “hash”). As an example, the 2008 Nakamoto white paper (a 9-page PDF file)
produces the following digest:
“b1674191a88ec5cdd733e4240a81803105dc412d6c6708d53ab94fc248f4f553.”
49 Much of this description is based on information presented by Zulfikar Ramzan in a series of excellent
Khan Academy videos on bitcoin. https://www.khanacademy.org/economics-finance-domain/corefinance/money-and-banking/bitcoin/v/bitcoin-what-is-it
50 Given that the one bitcoin is currently worth over $2,500, this would be a very expensive widget. We use
whole numbers only to simplify the example.
37
A secure hash function has the following properties:
•
•
•
•
Efficient: The hash function is computationally efficient, or easy to compute.
Deterministic: For a given input, the output will always be the same. At the same time,
the output appears random, so that even a slight change in an input string causes the
hash value to change drastically. For example, if we removed a comma from the
Nakamoto paper, the digest would look completely different.
Collision-resistant: A collision takes place when two input messages are mapped onto
the same digest. Because the input string can take on an infinite number of values, while
the output string is fixed, collisions are bound to happen. This relates to the pigeonhole
principle: Any time there are N inputs and M containers and N>M, then at least one of
those containers will include more than one input. In a bitcoin blockchain, the hash can
take 2^256 forms (1 trailed by 77 zeroes). Although collisions are theoretically possible,
they should take “an astronomically long time” to find.
No reverse engineering: The hash function is often called a “one-way” or “trap-door”
function because it is impossible to glean any information from the digest about the
input message. In other words, it is impossible to reverse engineer from the digest back
to the input message. This again relates to the pigeonhole principle: because the possible
inputs of a hash function are infinite but the hash output is fixed, there are an infinite
number of possible input strings for each output string, which makes reversing
essentially impossible.51
With that out of the way, we can return to the example of Alice and Bob. At this point, the
nodes on the network have checked the validity of Alice’s transaction message and added it
to a transaction block along with other transactions received within a short timeframe. The
node hashes each of the individual transaction messages in the block. It then combines these
encrypted messages into pairs and hashes that combination. It repeats this process of
combining and hashing until a single output string remains, which is known as the “hash of
all hashes.” That combined hash value is then placed in a block’s header (Figure VI), where
it is combined with two important pieces of information: a timestamp and the hash of the
previous block header. Together these pieces of information serve as inputs to the proof of
work puzzle that the nodes race one another to solve.
The challenge is that the node has to find a random number (called a “nonce”) which, when
combined with all of the other information in the block header produces a target hash,
which is simply a 256-bit string with a certain number of leading zeroes (say, 20). To begin, a
node appends a random number to the block header and hashes it. If that doesn’t produce
the target, the node will try another random number and hash again. The only way to solve
the puzzle is through trial and error and continuously testing random numbers, which the
nodes do at a rate of trillions of hashes per second.
51
The “essentially” caveat stems from the fact that reverse engineering is impossible with existing
technology but could become possible if/when quantum computing arrives.
38
One of the fascinating things about the Bitcoin protocol is that it will change the difficulty of
meeting this target depending on how much computational power is on the network, with
the aim of having a node solve the puzzle every 10 minutes.
Once a node wins the race and becomes the first to solve the puzzle, it receives a payment of
new bitcoin and the transaction fees associated with all the transactions in the confirmed
block. The confirmed block is “sealed off” and sent to other nodes for verification that the
solution works and the data in the block is consistent with the history of the entire
blockchain. This verification happens within seconds and once complete, the block is added
to a blockchain.
Although it occurs rarely, it is possible for two (or more) nodes to solve the proof of work
and append a new block to the blockchain at the same time, which creates a fork in the
chain. The Bitcoin protocol solves this problem with a simple rule that requires nodes to
work off the longest chain (or more accurately, the chain that involves the most
computational effort).
Consider a scenario in which a fork occurs on a blockchain that creates two new blocks:
Block A and Block B (illustrated in Figure VII) (Nielsen 2013). While some nodes on the
network receive “Block A” first and begin to work off it, others receive “Block B” and work
off an alternate chain. After approximately ten minutes, one of the nodes working off Block
A solves the proof of work and appends a new block on top of it. Once other nodes receive
this information, they throw out all the transactions they were using to solve the latest block
and begin to work off the longest chain. No further work is done on Block B and it becomes
an “orphaned block.”
Because it is theoretically possible that a node working off Block A and a node working off
Block B solve the proof of work at the same time—thereby extending the fork for at least
another 10 minutes—bitcoin transactions are not considered “confirmed” until they have
been followed by five subsequent blocks. 52 By that time, it is very likely that the network will
be able to reach agreement on the proper ordering of blocks. Likewise, the odds of being
able to tamper with a block drop exponentially as subsequent blocks are added to the chain.
52
The standard of not confirming a transaction until it is “six blocks deep” is largely arbitrary. The
probability of being able to double spend by tampering with a previously verified transaction depends on an
attacker’s mining power and the number of blocks that been appended to the chain since a given transaction. For
example, using the formula in Nakamoto’s paper, if an attacker has ten percent of the mining power on the
network and six confirmations are required, there is a .024 percent chance that the attack will be successful.
39
Figure VI
40
Figure VII
41
Bibliography
Accenture. 2017. “UNHCR: Innovative Identity Management System That Uses Biometrics
to Better Serve Refugees.” Accessed July 11. https://www.accenture.com/usen/success-unhcr-innovative-identity-management-system.
Alexander, Myrna, and Charles Fletcher III. 2012. “Analysis of World Bank Completed
Cases of Fraud and Corruption from the Perspective of Procurement.” World Bank.
https://consultations.worldbank.org/Data/hub/files/meetings/Procurement_Polic
ies/Analysis_F&C_Findings_Completed_Cases.pdf.
Arrow, Kenneth J. 1972. “Gifts and Exchanges.” Philosophy & Public Affairs 1 (4): 343–62.
Back, Adam. 2002. “Hashcash - A Denial of Service Counter-Measure.”
http://www.hashcash.org/papers/hashcash.pdf.
Banking Circle. 2016. “Whitepaper - Today’s Landscape; Tomorrow’s Opportunity’.”
https://www.saxopayments.com/todays-landscape-tomorrows-opportunity.
BanQu. 2017. “Our Technology.” BanQu. February 26. http://www.banquapp.com/oursolutions/our-technology/.
BBC News. 2017. “Accenture and Microsoft Plan Digital IDs for Millions of Refugees.”
BBC News, June 20, sec. Technology. http://www.bbc.com/news/technology40341511.
Better than cash. 2017. “How Digitizing Agricultural Input Payments in Rural Kenya Is
Tackling Poverty: The Case of One Acre Fund.” Better Than Cash Alliance. May.
https://www.betterthancash.org/tools-research/case-studies/digitizing-agriculturalinput-payments-in-rural-kenya.
Bitcoin wiki. 2017a. “Block Size Limit Controversy - Bitcoin Wiki.” Accessed July 11.
https://en.bitcoin.it/wiki/Block_size_limit_controversy.
Bitcoin wiki. 2017b. “Scalability - Bitcoin Wiki.” Accessed July 11.
https://en.bitcoin.it/wiki/Scalability.
Blattman, Chris, Michael Faye, Dean Karlan, Paul Niehaus, and Chris Udry. 2017. “Cash as
Capital (SSIR).” Accessed July 11. https://ssir.org/articles/entry/cash_as_capital.
Buterin, Vitalik. 2016. “Privacy on the Blockchain.” Ethereum Blog. January 15.
https://blog.ethereum.org/2016/01/15/privacy-on-the-blockchain/.
Cameron, Kim. 2005. “The Laws of Identity.” Architect of Identity, Microsoft Corporation.
http://www.identityblog.com/stories/2005/05/13/TheLawsOfIdentity.pdf.
Castell, Helen. 2015. “Is IATI Benefiting Anyone Yet?” Devex. December 3.
https://www.devex.com/news/sponsored/is-iati-benefiting-anyone-yet-87191.
Castro, Miguel, and Barbara Liskov. 1999. “Practical Byzantine Fault Tolerance.” Proceedings
of the Third Symposium on Operating Systems Design and Implementation, February.
http://pmg.csail.mit.edu/papers/osdi99.pdf.
Charles Kenny. 2017. “How Much Aid Is Really Lost to Corruption?” Center For Global
Development. January 23. https://www.cgdev.org/blog/how-much-aid-really-lostcorruption.
Coin Republic. 1999. Milton Friedman Predicts the Rise of Bitcoin in 1999!
https://www.youtube.com/watch?v=MvBCDS-y8vc.
coinsph. 2016. “Money Transfers with Coins.ph and Stellar.” Coins.ph. December 8.
http://blog.coins.ph/post/154187055649/money-transfers-with-coinsph-andstellar.
Coleman, Lester. 2016. “As Mining Expands, Will Electricity Consumption Constrain
Bitcoin?” CryptoCoinsNews. July 25. https://www.cryptocoinsnews.com/as-miningexpands-will-electricity-consumption-constrain-bitcoin/.
Collin, Matthew, Louis De Koker, Matthew Juden, Joseph Myers, Vijaya Ramachandran,
Amit Sharma, and Gaiv Tata. 2015. “Unintended Consequences of Anti–Money
Laundering Policies for Poor Countries.” Center for Global Development.
42
https://www.cgdev.org/sites/default/files/CGD-WG-Report-UnintendedConsequences-AML-Policies-2015.pdf.
Crosby, Michael, Nachiappan, Pradhan Pattanayak, Sanjeev Verma, and Vignesh
Kalyanaraman. 2015. “Blockchain Technology: Beyond Bitcoin.” Sutardja Center
for Entrepreneurship & Technology Technical Report.
http://scet.berkeley.edu/wp-content/uploads/BlockchainPaper.pdf.
CryptoCompare. 2017. “The DAO, The Hack, The Soft Fork and The Hard Fork.”
CryptoCompare. July 5. https://www.cryptocompare.com/coins/guides/the-dao-thehack-the-soft-fork-and-the-hard-fork/.
Dahan, Mariana, and John Edge. 2015. “The World Citizen: Transforming Statelessness into
Global Citizenship.” Text. Information and Communications for Development World Bank.
November 25. http://blogs.worldbank.org/ic4d/world-citizen-transformingstatelessness-global-citizenship.
David Siegel. 2016. “Understanding The DAO Attack.” CoinDesk. June 25.
http://www.coindesk.com/understanding-dao-hack-journalists/.
De Filippi, Primavera, and Benjamin Loveluck. 2016. “The Invisible Politics of Bitcoin:
Governance Crisis of a Decentralised Infrastructure.” Internet Policy Review 5 (3).
https://policyreview.info/articles/analysis/invisible-politics-bitcoin-governancecrisis-decentralised-infrastructure.
De Silva, Matthew. 2017. “United Nations World Food Programme Uses Ethereum to Aid
Syrian Refugees.” ETHNews.com. June 13. https://www.ethnews.com/unitednations-world-food-programme-uses-ethereum-to-aid-syrian-refugees.
Deininger, Klaus. 2003. “Land Policies for Growth and Poverty Reduction.” 26384. The
World Bank.
http://documents.worldbank.org/curated/en/485171468309336484/Land-policiesfor-growth-and-poverty-reduction.
Desjardins, Jeff. 2015. “All of the World’s Money and Markets in One Visualization.” The
Money Project. December 17. http://money.visualcapitalist.com/all-of-the-worldsmoney-and-markets-in-one-visualization/.
Diffie, Whitfield, and Martin E. Hellman. 1976. “New Directions in Cryptography,” IEEE
TRANSACTIONS ON INFORMATION THEORY, IT-22 (6). https://wwwee.stanford.edu/~hellman/publications/24.pdf.
Dutch Blockchain Conference. 2016. David Birch - How to Use Identity & the Blockchain | Dutch
Blockchain Conference #dbc16.
https://www.youtube.com/watch?v=hS15p5V3slg&feature=youtu.be&t=1463.
Edwards, Owen. 2017. “The Enabling Environment for Blockchain Technology.” LinkedIn
Pulse. March 17. https://www.linkedin.com/pulse/enabling-environmentblockchain-technology-owen-edwards.
e-Estonia. 2017. “ID Card.” E-Estonia. Accessed July 11. https://e-estonia.com/solutions/eidentity/id-card/.
ET Bureau. 2017. “Aadhaar Scheme Helped Government Save Rs 34,000 Crore: Finance
Secy.” The Economic Times, March 30.
http://economictimes.indiatimes.com/news/economy/finance/dbt-leads-to-rs34000-crore-savings-for-government-finmin/articleshow/57894751.cms.
Financial Times. 2017. “Alphaville.” Accessed July 11.
https://ftalphaville.ft.com/2017/06/14/2190149/blockchains-governanceparadox/?mhq5j=e2.
Fred Pearce. 2016. “Common Ground: Securing Land Rights and Safeguarding the Earth.”
Oxfam. https://www.oxfam.org/sites/www.oxfam.org/files/file_attachments/bpcommon-ground-land-rights-020316-en_0.pdf.
Gambetta, Diego. 2000. “Can We Trust Trust?” In Trust: Making and Breaking Cooperative
Relations, edited by Diego Gambetta, 213–237. Blackwell.
43
http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.24.5695&rep=rep1&typ
e=pdf.
German Development Institute. 2004. “Donor Coordination: A Basic Requirement for
More Efficient and Effective Development Cooperation.” https://www.diegdi.de/uploads/media/7_2004_EN.pdf.
Gord, Michael. 2016. “Smart Contracts Described by Nick Szabo 20 Years Ago Now
Becoming Reality.” Bitcoin Magazine. April 26.
https://bitcoinmagazine.com/articles/smart-contracts-described-by-nick-szaboyears-ago-now-becoming-reality-1461693751/.
Goss, Brian. 2017. “Bitcoin Tutorial: Learn What Is Bitcoin and Lot More.” Udemy.
Accessed July 11. https://www.udemy.com/bitcoin-or-how-i-learned-to-stopworrying-and-love-crypto/.
Graglia, Michael. 2017. “5 Myths About Blockchains.” New America. April 14.
https://www.newamerica.org/international-security/future-property-rights/blog/5myths-blockchains-registries/.
GSMA. 2017. “State of the Industry Report on Mobile Money.”
https://www.gsma.com/mobilefordevelopment/wpcontent/uploads/2017/03/GSMA_State-of-the-Industry-Report-on-MobileMoney_2016.pdf.
Haber, Stuart, and W. Scott Stornetta. 1991. “How to Time-Stamp a Digital Document,”
Journal of Cryptology, 3 (2): 99–111.
Heider, Caroline, and April Connelly. 2016. “Why Land Administration Matters for
Development.” June 28. http://ieg.worldbankgroup.org/blog/why-landadministration-matters-development.
Hruska, Joel. 2014. “One Bitcoin Group Now Controls 51% of Total Mining Power,
Threatening Entire Currency’s Safety - ExtremeTech.” June 14.
https://www.extremetech.com/extreme/184427-one-bitcoin-group-now-controls51-of-total-mining-power-threatening-entire-currencys-safety.
Ingram, George. 2014. “Building Aid Transparency: More Data, Better Data.” Brookings. June
13. https://www.brookings.edu/blog/up-front/2014/06/13/building-aidtransparency-more-data-better-data/.
International Aid Transparency Initiative. 2017. “International Aid Transparency Initiative.”
Accessed July 14. http://www.aidtransparency.net/.
IRS. 2014. “IRS Virtual Currency Guidance : Virtual Currency Is Treated as Property for
U.S. Federal Tax Purposes; General Rules for Property Transactions Apply.” March
25. https://www.irs.gov/uac/newsroom/irs-virtual-currency-guidance.
Jacob Worth. n.d. The Brilliant Earth Diamond Scam.
https://www.youtube.com/watch?v=Yvatzr7pA70.
Kelley, Patrick, and Michael Graglia. 2017. “Why Property Rights Matter.” New America.
March 10. https://www.newamerica.org/international-security/future-propertyrights/blog/blockchain-for-property-rights-georgia/.
Knight, Will. 2017. “China’s Central Bank Has Begun Cautiously Testing a Digital
Currency.” MIT Technology Review. Accessed July 10.
https://www.technologyreview.com/s/608088/chinas-central-bank-has-beguncautiously-testing-a-digital-currency/.
Konner, Melvin. 2017. “Mobile Banking Gives a Big Boost To Kenya’s Poor.” Wall Street
Journal, January 13, sec. Life. http://www.wsj.com/articles/mobile-banking-gives-abig-boost-to-kenyas-poor-1484324293.
KYC-Chain. 2017. “KYC-Chain - Enhanced KYC on Blockchain Technology.” Accessed
July 14. https://kyc-chain.com/.
44
Lawson, Marian Leonardo. 2013. “Foreign Aid: International Donor Coordination of
Development Assistance.” Congressional Research Service.
https://fas.org/sgp/crs/row/R41185.pdf.
Lewis, Antony. 2016. “A Gentle Introduction to Immutability of Blockchains.” Bits on Blocks.
February 29. https://bitsonblocks.net/2016/02/29/a-gentle-introduction-toimmutability-of-blockchains/.
Lielacher, Alex. 2017. “Is the Time Finally Ripe for Bitcoin Remittances in Africa?” Bitcoin
Magazine. Accessed July 11. https://bitcoinmagazine.com/articles/is-the-timefinally-ripe-for-bitcoin-remittances-in-africa-1476387861/.
Mazieres, David. 2016. “The Stellar Consensus Protocol: A Federated Model for InternetLevel Consensus.” Stellar Development Foundation.
https://www.stellar.org/papers/stellar-consensus-protocol.pdf.
Monax. 2017. “Explainer | Smart Contracts.” Monax. Accessed July 10.
https://monax.io/explainers/smart_contracts/.
Nathan Rosenberg. 2004. “Innovation and Economic Growth.” OECD.
https://www.oecd.org/cfe/tourism/34267902.pdf.
Nelson, Paul. 2016. “Virtual Currencies Create Pathways for People in Emerging
Economies.” TechCrunch. March 26.
http://social.techcrunch.com/2016/03/26/virtual-currencies-and-distributedledgers/.
Nielsen, Michael. 2013. “How the Bitcoin Protocol Actually Works | DDI.” December 6.
http://www.michaelnielsen.org/ddi/how-the-bitcoin-protocol-actually-works/.
North, Douglass C. 1991. “Institutions,” Journal of Economic Perspectives, 5 (1): 97–112.
OECD. 2003. “Harmonising Donor Practices for Effective Aid Delivery.”
https://www.oecd.org/dac/effectiveness/20896122.pdf.
Palermo, Elizabeth, Associate Editor | March 19, and 2014 01:13am ET. 2014. “Who
Invented the Steam Engine?” Live Science. March 19.
https://www.livescience.com/44186-who-invented-the-steam-engine.html.
Poon, Joseph, and Thaddeus Dryja. 2016. “The Bitcoin Lightning Network: Scalable OffChain Instant Payments.” https://lightning.network/lightning-network-paper.pdf.
Principles for digital development. 2017. “Principles for Design & Development.” Accessed
July 17. http://digitalprinciples.org/.
Ramzan, Zulfikar. Bitcoin: What Is It? 2017. Accessed July 11.
https://www.khanacademy.org/economics-finance-domain/core-finance/moneyand-banking/bitcoin/v/bitcoin-what-is-it.
Rizzo, Pete. 2016. “Inside ‘Spark’: Circle’s New Bitcoin-Powered Smart Contract Platform.”
CoinDesk. December 8. http://www.coindesk.com/inside-spark-circles-new-bitcoinpowered-smart-contract-platform/.
Rizzo, Pete. 2017. “47 Banks Complete DLT Cloud Pilot With Ripple Tech.” CoinDesk.
March 2. http://www.coindesk.com/47-banks-blockchain-complete-dlt-cloud-pilotripple-tech/.
SaveOnSend. 2017. “Does Bitcoin Make Sense for International Money Transfer?”
SaveOnSend Blog. June 10. https://www.saveonsend.com/blog/bitcoin-moneytransfer/.
SecureKey. 2017. “IBM and SecureKey Technologies to Deliver Blockchain-Based Digital
Identity Network for Consumers.” SecureKey. Accessed July 11.
http://securekey.com/press-releases/ibm-securekey-technologies-deliverblockchain-based-digital-identity-network-consumers/.
CoinMarketCap. 2017. “CryptoCurrency Market Capitalizations | CoinMarketCap.”
Accessed July 11. https://coinmarketcap.com/currencies/views/all/.
Smith, Merritt Roe, Merton C. Flemings, Evan I. Schwartz, Claire Calcagno, Kristin Finn,
Rayvon Fouche, Robert Friedel, et al. 2003. “Historical Perspectives on Invention
45
and Creativity.”
http://web.mit.edu/monicaru/Public/old%20stuff/For%20Dava/Grad%20Librar
y.Data/PDF/history-3289136129/history.pdf.
Sovrin Technology. 2017. “Sovrin Technology.” Sovrin. Accessed July 10.
https://sovrin.org/technology/.
Stellar. 2017. “Ledger | Stellar Developers.” Accessed July 10.
https://www.stellar.org/developers/guides/concepts/ledger.html.
Sundberg, Mark, and Alan Gelb. 2006. “Finance and Development.” Finance and Development
| F&D, December.
http://www.imf.org/external/pubs/ft/fandd/2006/12/sundberg.htm.
SWIFT. 2015. “The KYC Registry: What Users Say.” SWIFT. November 27.
https://www.swift.com/our-solutions/compliance-and-shared-services/financialcrime-compliance/the-kyc-registry/testimonials.
Tapscott, Don. 2017. “Transcript of ‘How the Blockchain Is Changing Money and
Business.’” Accessed July 11.
https://www.ted.com/talks/don_tapscott_how_the_blockchain_is_changing_mon
ey_and_business/transcript.
Tapscott, Don, and Alex Tapscott. 2016. Blockchain Revolution.
http://dontapscott.com/books/blockchain-revolution/.
The Economist. 2015. “The Trust Machine.” October 31.
https://www.economist.com/news/leaders/21677198-technology-behind-bitcoincould-transform-how-economy-works-trust-machine.
The SEACEN Centre. n.d. 11th SSDR: The Next Generation of Cross Border Payments.
https://www.youtube.com/watch?v=PzScsRNsoT0&feature=youtu.be&t=3m50s.
Thomas, Stefan and Schwartz, Evan. 2015. “A Protocol for Interledger Payments.”
Interledger. https://interledger.org/interledger.pdf.
Thomson Reuters. 2016. “Thomson Reuters 2016 Know Your Customer Surveys Reveal
Escalating Costs and Complexity.” Thomson Reuters. May 9.
https://www.thomsonreuters.com/content/thomsonreuters/en/pressreleases/2016/may/thomson-reuters-2016-know-your-customer-surveys.html.
Tradle. 2016. “KYC Network on Blockchain.” http://www.fintechconnectlive.com/wpcontent/uploads/2016/12/11.20-Tradle.pdf.
Tradle. 2017. “Tradle. Trust Provisioning on Blockchain.” Accessed July 14.
https://tradle.io/.
United Nations High Commissioner for Refugees. 2017. “Figures at a Glance.” UNHCR.
June 19. http://www.unhcr.org/figures-at-a-glance.html.
UNSG. 2012. “Secretary-General’s Closing Remarks at High-Level Panel on Accountability,
Transparency and Sustainable Development | United Nations Secretary-General.”
July 9. https://www.un.org/sg/en/content/sg/statement/2012-07-09/secretarygenerals-closing-remarks-high-level-panel-accountability.
Value Penguin. 2017. “Credit Card Processing Fees and Costs.” ValuePenguin. Accessed July
11. https://www.valuepenguin.com/what-credit-card-processing-fees-costs.
Veem. 2015. “Frequently Asked Questions on How to Send and Receive Wire Transfers.”
Veem. October 22. https://www.veem.com/faq/.
Victoria Louise Lemieux. 2016. “Trusting Records: Is Blockchain Technology the Answer?”
Records Management Journal 26 (2): 110–39. doi:10.1108/RMJ-12-2015-0042.
VISA Inc. 2014. “Visa Inc. at a Glance.”
https://usa.visa.com/dam/VCOM/download/corporate/media/visa-fact-sheetJun2015.pdf.
Walch, Angela. 2015. “The Bitcoin Blockchain as Financial Market Infrastructure: A
Consideration of Operational Risk.” New York University Journal of Legislation & Public
Policy, New York University Journal of Legislation & Public Policy, 18 (4).
46
http://www.modernmoneynetwork.org/sites/default/files/biblio/Walch%20%20Bitcoin%20Blockchain%20as%20Financial%20Market%20Infrastructure.pdf.
Walch, Angela. 2016. “Call Blockchain Developers What They Are: Fiduciaries.” American
Banker. August 9. https://www.americanbanker.com/opinion/call-blockchaindevelopers-what-they-are-fiduciaries.
Walch, Angela. 2017. “The Path of the Blockchain Lexicon (and the Law),” Boston
University Review of Banking & Financial Law, , February.
https://www.bu.edu/rbfl/files/2017/02/The-Path-of-the-Blockchain-LexiconFeb-13-2017-Draft.pdf.
Warburg, Bettina. 2017. How the Blockchain Will Radically Transform the Economy. Accessed July
11.
https://www.ted.com/talks/bettina_warburg_how_the_blockchain_will_radically_t
ransform_the_economy.
WeUseCoins. 2013. “Why the Blocksize Limit Keeps Bitcoin Free and Decentralized.” May
16. https://www.weusecoins.com/why-blocksize-limit-keeps-bitcoin-freedecentralized/.
Wolverton II, Joe A. 2013. “Rand Paul Calls for Investigation of Foreign Aid Fraud.” May 2.
https://www.thenewamerican.com/usnews/foreign-policy/item/15276-rand-paulcalls-for-investigation-of-foreign-aid-fraud.
World Bank. 2015. “Corridors | Remittance Prices Worldwide.”
https://remittanceprices.worldbank.org/en/countrycorridors.
World Bank. 2016. “Remittance Prices Worldwide: An Analysis of Trends in Cost of
Remittance Services.” 20.
https://remittanceprices.worldbank.org/sites/default/files/rpw_report_december_
2016.pdf.
World Bank. 2017. “Migration and Remittances: Recent Developments and Outlook.”
http://pubdocs.worldbank.org/en/992371492706371662/MigrationandDevelopme
ntBrief27.pdf.
World Bank. 2017. “Migration and Remittances Factbook 2016.” Text/HTML. World Bank.
Accessed July 11. http://www.worldbank.org/en/research/brief/migration-andremittances.
World Bank Group. 2017. “Identification for Development (ID4D) Making Everyone
Count.” http://pubdocs.worldbank.org/en/332831455818663406/WorldBankBrochure-ID4D-021616.pdf.
World Bank Group, and Center for Global Development. 2017. “Principles on Identification
for Sustainable Development: Toward the Digital Age.”
http://documents.worldbank.org/curated/en/213581486378184357/pdf/112614REVISED-4-25-web-English-final-ID4D-IdentificationPrinciples.pdf.
Zcash. (2015) 2017. Zips: Zcash Improvement Proposals. TeX. Zcash.
https://github.com/zcash/zips.
Zcash. 2017. “Zcash - All Coins Are Created Equal.” Accessed July 11. https://z.cash/.
47