10/20 - cryptocurrency

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/42

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

43 Terms

1
New cards

What is cryptocurrency?

A decentralized digital form of money, built on blockchain technology, designed to prevent forgery and enforce scarcity.

2
New cards
3
New cards

How is cryptocurrency created?

Through mining, which requires computational work; as more coins are created, mining becomes increasingly computationally intensive.

4
New cards
5
New cards

What is the role of blockchain in cryptocurrency?

It prevents double-spending, ensures scarcity, and records transactions across a distributed ledger that is agreed upon by the network.

6
New cards
7
New cards

Why is cryptocurrency considered decentralized?

No single entity controls issuance, transaction flow, or value; consensus is maintained through the network of participants.

8
New cards
9
New cards

What anonymity protections does cryptocurrency provide?

Wallet addresses are encrypted, user identities aren’t required for wallet creation, and transactions can be pseudonymous.

10
New cards
11
New cards

How are disputes in cryptocurrency transactions resolved?

By majority consensus of the distributed ledger; the version that most nodes agree on is considered authoritative.

12
New cards
13
New cards

What kinds of crime does cryptocurrency enable?

Tax fraud, ransomware payments, buying and selling illegal goods, and sanction evasion.

14
New cards
15
New cards

Why is cryptocurrency hard to regulate?

Transactions are pseudonymous, decentralized, globally accessible, and can be moved or mixed across wallets and exchanges, often bypassing traditional financial controls.

16
New cards
17
New cards

How can governments try to regulate or block criminal cryptocurrency use?

By sanctioning exchanges or wallets, monitoring transactions, geolocating IP addresses, and blocking access to sanctioned entities.

18
New cards
19
New cards

What are mixers in cryptocurrency?

Services that mix coins from multiple wallets to obscure the origin, used to launder stolen or illicit funds.

20
New cards
21
New cards

How did North Korea exploit cryptocurrency for sanctions evasion?

They laundered funds via mixers and bridges, updating infrastructure to circumvent wallet blocks and sanctions.

22
New cards
23
New cards

What was the Colonial Pipeline case an example of?

A ransomware attack targeting critical infrastructure, with subsequent tracing and partial recovery of cryptocurrency ransom payments.

24
New cards
25
New cards

What challenges arise when tracing cryptocurrency transactions?

Funds can be moved across multiple wallets, through mixers, and via exchanges in different jurisdictions, making attribution and enforcement difficult.

26
New cards
27
New cards

How did China regulate cryptocurrency?

By blocking all domestic and foreign cryptocurrency trading and ICO websites, aiming to eliminate risks from illegal issuance, fraud, and speculation.

28
New cards
29
New cards

What are the U.S. regulatory frameworks for cryptocurrency?

30
New cards
31
New cards

FinCEN Guidelines (2013): Virtual currency exchanges are money transmitters; subject to Know Your Customer (KYC) rules.

32
New cards
33
New cards

New York BitLicense (2015): Requires licensing, detailed record-keeping, and compliance with anti-money laundering laws.

34
New cards
35
New cards

How is cryptocurrency classified under U.S. law?

It can be considered a security (regulated by the SEC) or a commodity (regulated by the CFTC), depending on its use and characteristics.

36
New cards
37
New cards

What was the significance of the Tornado Cash sanctions?

OFAC designated the mixer for laundering stolen cryptocurrency, demonstrating that decentralized platforms still rely on centralized components vulnerable to enforcement.

38
New cards
39
New cards

What are bridge protocols in cryptocurrency?

Services that move cryptocurrency between blockchains and can disguise origins, also targeted for laundering by actors like North Korea.

40
New cards
41
New cards

How do exchanges facilitate circumvention of local restrictions?

By using VPNs, alternate domains, lax KYC procedures, and routing users to global platforms despite local bans (e.g., Binance in China).

42
New cards
43
New cards

What lesson does Silk Road and AlphaBay enforcement illustrate?

Even decentralized or anonymized cryptocurrency transactions can be traced through operational security failures, law enforcement surveillance, and seizure of private keys.