We are happy to report that our recent in-depth Practice Note on Blockchain as applied to Supply Chain Management was selected to appear as the cover story for the June/July issue of Practical Law – The Journal. Read the full text here.… Continue Reading
The plot has thickened in the longest-running “whodunit” in the blockchain space: Who is Satoshi Nakamoto, the pseudonymous creator of Bitcoin and author of the white paper that started it all, Bitcoin: A Peer-to-Peer Electronic Cash System? Published in 2008, Nakamoto’s paper proposed a form of electronic cash that would operate purely peer-to-peer, without the … Continue Reading
Proskauer partners Daniel Ganitsky and Jeff Neuburger address five factors for private equity firms to consider when evaluating the critical business decision of implementing blockchain-based technology solutions for their portfolio companies: Daniel Ganitsky: Technology is causing private equity firms to deal with a whole new set of questions for their portfolio companies. The use of blockchain technology is one … Continue Reading
When a smart contract coding vulnerability resulted in the Parity wallet “freeze” that compromised over $150 million worth of user funds, we discussed the pitfalls of unsecure code in the context of cryptoassets and the extent to which software developers might be held liable to their users for losses arising from mistakes in, or the … Continue Reading
Last year’s spike in the valuation of bitcoin has much of the technology world focused on blockchain, the distributed database ledger technology behind bitcoin and many other cryptocurrencies. Lost behind the scenes, however, is a rush by some in the industry to patent inventions relating to the blockchain technology itself. These moves come with controversy … Continue Reading
The recent Parity wallet “freeze” provides yet another example of a coding vulnerability in a smart contract (rather than a flaw in the underlying blockchain or cryptography) resulting in an exploit that compromises cryptocurrency worth millions. It again highlights some of the pitfalls of insecure code in the context of digital assets and raises questions … Continue Reading
This website uses third party cookies, over which we have no control. To deactivate the use of third party advertising cookies, you should alter the settings in your browser.