by Larry Cao, CFA, CFA Institute
- What is blockchain technology, and how does it work? What are its benefits and risks, who will be disrupted, and who will be the disruptors? Is this technology just hype or is it real?
- How might the distributed ledger of blockchain improve upon existing transaction and ownership protocols? What stands in the way of large-scale adoption?
- What are the practical implications of blockchain in the near and intermediate terms? Should todayās financial professionals allocate time and resources to blockchain technology or pursue a āwait and seeā strategy until there is a clearer path for this complex technology?
CAMPBELL R. HARVEY: So, Iām not going to talk about the misrepresentation of earnings, OK? Though I could. Iām going to talk about something that is kind of different from my usual research. And it has to do with a blockchain. So to be perfectly honest, this is the first hour of the course that I teach at Duke University to second-year MBA students, and the course is called āInnovation and Cryptoventures.ā Iāve taught this course for three years. I just finished teaching it. Itās a fairly popular course. And maybe youāll see why.
Iām going to focus on the technology as well as applications. My course is not really a finance course. And youāre going to see that many of the applications of this technology are not in finance, OK?
My goal today is to try to communicate the basic idea of blockchain. So, youāll have a basic understanding of what it is, and weāre going to introduce some concepts that you might not have heard of, like cryptographic hashing. And I go into some detail. You might not like that detail, but weāre going to go into that detail.
So you will be, after today, hopefully in the 0.1% in terms of your knowledge of blockchain technology. And I think this setting at the CFA conference is a great setting for this. And what you need to be thinking about is that you want to be the disruptors, not the disruptees. OK? And blockchain is a highly disruptive technology. So, let me go through and give you a sketch of whatās actually happening here.
First thing, blockchain is the technology. There is no āthe blockchain.ā Thereās many different ways to actually implement a blockchain. And indeed, the idea of blockchain is not a new idea. Itās from 1991. Thereās a paper by two researchers in computer science that actually details this technology. And the application was time stamping of documents in a secure way. And weāre actually going to see that this application, the original application, has got a fair bit of relevance in terms of what weāre going to do today.
The other thing thatās a huge misperception, and that is many people believe that Bitcoin is blockchain. And indeed, this is perpetuated in the press where they interchangeably talk about blockchain and Bitcoin. Bitcoin uses blockchain technology. Thereās many other applications that use blockchain technology. We will talk in some detail about Bitcoin today because it is an important innovation, and there are many other cryptocurrencies that are out there also.
OK. So what is blockchain? So, blockchain is a ledger. Itās almost literally like a spreadsheet. And what it does is itās a ledger thatās shared. So, itās distributed, and indeed, these are three diagrams from a very famous paper in 1964 that was one of the foundational papers for the internet. And the motivation was a Soviet nuclear strike on the US, wiping out the main computing systems. And if the computing system was centralized, a hit on the central location would take out the nationās computers.
So, they started exploring decentralized and distributed. And the internet is kind of a combination of decentralized and distributed. You can take a piece out, but you canāt take the whole thing out. So, blockchain is going to be distributed. Itās a ledger that, essentially, depending on the application, anybody can download ā have it on your computer ā a copy of this ledger. So, blockchain also can be transparent or have varying degrees of transparency. And Iāll talk about that a little later on.
The number three property is that itās immutable. And this is very important. So you can add to a blockchain, but the idea is that you cannot go back and rewrite history. So, you cannot edit. So, this is where itās different than an Excel spreadsheet. So Excel spreadsheet, you just go, and you can edit some entries. So, with this technology, once itās there, itās there forever. OK? So, if thereās a mistake thatās made, maybe you can undo the mistake with another transaction. But you canāt go back and change anything in the history. So, this is a big innovation and important, as we will see fairly soon. OK.
And the fourth property is that this ledger is cryptographically secured. So, Iāve got a little diagram at the bottom. Iām going to go through more detail about this diagram, but essentially, whatās happening here is there is a commonality in these blocks of transactions. So, itās called blockchain because transactions are lumped into blocks, but thereās a commonality in that the very last line of one block is the first line of the next block. So, thatās the link, thatās the chain in this particular structure.
So again, this is different than an Excel sheet where thereās nothing like this. Itās just one sheet. You could have subsheets, but theyāre not linked like this. So this is basically what a blockchain actually is. So, for technology to be disruptive and successful, it has to solve problems, and this definitely solves problems. OK. So, we can use the blockchain, or blockchain technology, to basically do two general classes of operations. Number one, we can verify ownership very quickly, very efficiently that somebody actually owns something. And number two, it allows for the efficient exchange of ownership on this blockchain.
OK. So, one person thatās a loser is the middle person. So, any situation where youāve got a lot of middle people, this is probably a situation where blockchain could be very important. So, everybody is treated the same. So, we usually think of a customer, a retailer, a bankerā¦. No, everybody is treated equally in this technology. So again, this is the general overview. Iām going to go into much more detail and many more applications. But let me just start by motivating a few kind of obvious applications of this technology.
So, this is a shot of the NYSE from the 1920s. In the 1920s, it took five days to settle a stock transaction. In 1995, a revolutionary change happened where we moved from so-called t + 5 to t + 3. This was in 1995. Today, weāre t + 3.
And if you think about this, 1995 ā thatās the beginning of the World Wide Web. Internet becomes very accessible; popular computing speed is dramatically increased. Yet, weāre still stuck in t + 3 to settle a stock transaction. That, to me, doesnāt make any sense.
And indeed, the clearing corporations understand this. This should not happen in three days. This should happen in a matter of minutes, and blockchain is exactly the technology that can do this. OK. Second application ā property. And for those of you that have bought a house, you know what you have to do. It is a relic of history. You have to do a title search ā you have to employ lawyers often to do that. And the reason for the title search is that you want to make sure youāre buying the house from somebody that actually owns it.
OK. So, we have to go through this process to actuallyā¦. and if you get a mortgage, you might have to get title insurance because the bank doesnāt want to loan you the money to buy a house from somebody that might not even own it. OK, so this is a nightmare.
So again, blockchain technology is ideal for this. You have every municipality putting every single piece of land into a blockchain ā every single piece. And then anybody can download it. You go into your realtorās office or your lawyerās office, you see who owns the land, you see the liens on the land ā the mortgages and stuff like that ā and you can instantly do the transaction, very low cost. OK. So, this is an application of verification so you can verify that somebody actually owns the property. Itās also an application of efficient exchange. And something that we should have, that we donāt have.
Transferring funds ā this is one of the low-hanging fruits of blockchain technology. We constantly hear that SWIFT, the messaging system that enables wire transfers, is under attack. And it has been hacked multiple times, OK? And recently the New York Fed and a Bangladeshi bank got taken in terms of a SWIFT fraud. So, chain enables the transferring of funds in a highly secure way. I need to prove to you that itās highly secure, but thatās going to be fairly easy for me to do.
So, this is just another application and a very important application. So again, the general idea of money transfer ā today, itās very inefficient, very insecure, the fees are high, and often the fees are high to pay for the fraud detection. So if you can introduce a technology that actually is secure, you donāt need to invest in the fraud detection.
So what about counterfeiting? Thatās the most counterfeited bill in the world. And thereās the prime perpetrator of the counterfeiting. So, itās kind of obvious that we will go to digital currency. Itās kind of obvious. But thereās a problem, and itās the same problem that we have with copying digital music ā you can make a perfect copy. Digital video ā a perfect copy; a picture ā a perfect copy. Well, a simple version of digital currency ā and people have been trying to do this since 1981ā¦ that was the first digital currency that was introduced. Every single one failed. And the problem is that itās so easy to counterfeit. You can make a perfect digital copy.
Blockchain solves the problem. So, think of blockchain very roughly, at this point, of taking seriously the serial number on a bill. So, thatās effectively what weāre going to do, and all of the major central banks are looking into digital currency, and every single one knows that itās got to be based upon blockchain. OK? So, that is part of it.
OK. Hereās another application of verification. So, you get into your car, you put your thumb on your phone, and a blockchain is checked to see if you actually own the car. If you own the car, the car starts. So, thatās a verification of ownership.
But the blockchain can be a little more complicated than that. So, the blockchain could actually have a condition. So, maybe you have a loan on your car. And in the loan contract, it says that if you miss three monthly payments in a row, youāre in default. And suppose youāve missed three monthly payments in a row. You go into your car, thumb on the phone, it checks the blockchain, the car doesnāt start. The car starts for the bank. This is the sort of stuff thatās possible with this technology.
So, as I said, any situation, any situation where thereās middle people, in general, peer-to-peer technology will be disruptive. So again, think about situations where thereās a lot of middle men. I recently did a conference in ā it was actually sponsored by the law school ā on digital music. And the number of middle people involved is so extreme that the artist, even well-known artists, are lucky to get $0.25 on a dollar of revenue. That is just prime area for disruption with this technology.
OK. So, Iām going to talk about two different types of blockchains. So, in very general groupings, there is a public blockchain, and thereās going to be private blockchain. Itās important to understand both, though most of the kind of business applications these days are focused on the private side. But I want you to understand the public blockchain.
And the public blockchain is basically structured so you donāt need to trust anybody. So, people refer to this as a trustless technology. And Iāll talk about the Bitcoin blockchain because it is the most secure blockchain right now in the world. This is a computer program. Itās open source, so indeed, you can grab the computer program thatās available to anybody and make a minor change and create your own coin. I did this. I created Camcoin. Itās not very popular, but itās really easy to do. So, anybody can do this. And within the public domain, there are many choices that you make in terms of the blockchain technology.
So one ofā¦. The second most important cryptocurrency is called Ethereum. And Ethereum has got this advantage that you can actually do contracting within their blockchain. So, you can have an āif/thenā condition. So, if IBM stock finishes above $100, then I get a certain payoff ā so, like an option. So, any if/then statement can be embedded in their blockchain.
The Bitcoin blockchain is more rigid. But again, it is the original one from 2009. There are various mechanisms that are used to validate and to secure these blockchains. And I will talk mainly about something thatās known as āproof of work.ā And I need to describe to you what that work is.
A private blockchain is a situation where you actually need to trust somebody. So, it might be that the municipality sets up a private blockchain and puts all the land in. You actually need to trust the municipality to put those entries in correctly. Or it might be a consortium of banks that get together and allow for more efficient transfers between the banks. And again, you would need to trust that group of banks. So, itās very important to determine, when youāre thinking about the type of blockchain, to determine how important it is to be trustless, or is it OK to allow for some trust. Trustless actually has a cost to it, and Iāll describe that cost in a few minutes.
So, Iām glad youāre here because I really do think that everybody should understand the cover story in The Economist. So, that should be part of the CFA designation, that at minimum, we should understand what is going on with blockchain. And this is not a small thing. So, I talked about clearing, and the DTCC is looking at blockchain technology to clear derivatives. Thatās an $11 trillion market. So, you can see that thereās big upside with this particular technology.
This is just recently. Spotify buys a tiny startup called Mediachain, and again, they recognized that within the digital music industry there are many problems that blockchain can actually solve. OK. So, let me talk about the Bitcoin blockchain. So, it is distributed, it is secure, it is transparent. So, that means anybody can download this and see the plain text transactions. And every single transaction is in this blockchain. The blockchain is about 95 gigabytes. So, itās not really even that big.
So, anybody can download it, and it establishes ownership, allows for efficient transaction at very low fees. OK. Nobody controls it. It is trustfulness. So thereās no CEO of Bitcoin. It is a computer program. And in my course, we talk about DAOs. And DAO is not the Dow Jones average. Itās a distributed autonomous organization.
This is a computer program that has created a lot of value. And literally, people work for the program. So, people are actually working for a computer program. It is a glimpse of the future. So, this particular blockchain is actually secured by unprecedented computing power, and I will go into some of the strong cryptography thatās used so that it cannot feasibly be hacked.
So, Iāll talk a little bit about miners also. Theyāre the ones that verify and provide the security of this particular ledger. So, how powerful? And this is really, to me, staggering. The Bitcoin network right now has the equivalent computing power of 47 million petaFLOPS. So, āFLOPSā is floating point operations per second. Compare that to the fastest supercomputer: Itās 93. So, 47 million compared to 93.
So if youāre in the know about this technology, one thing ā and this is important ā you actually donāt need to do floating point operations. So, the sort of technology thatās used for the Bitcoin blockchain is more akin to a GPU rather than a CPU. Nevertheless, to actually cause any problems with this blockchain, you would need half of the computing power of the network, and itās going to cost well over a $1 billion to actually do that.
So, all of the average hackers, they cannot touch this. Maybe a state actor, a nefarious state actor could disrupt the current transactions, but it is extremely unlikely that they can go back and rewrite history. So, this is unprecedented computing power that is behind this particular blockchain.
OK, so the first term that might be new to some of you is āhash.ā Not hashtag, but cryptographic hash. So, Iām going to do two examples. One is a very simple one that points out the problem with this particular simple hash, and then Iāll do a more complicated one where Iāll go to the internet.
So, letās say I want to send an email to Marie, and Iām worried that that email is going to be intercepted and corrupted. So, what Iām going to do is to do a simple hash of the single word in the email, āhello.ā And my simple hash is I will assign a number to every letter. So, A is 1 and Z is 26.
So, when they do that, itās 8-5-12-12-15. And my hash is going to multiply those numbers together. And I get 86,400. Iām going to post that hash on my website.
Iāll send the email to Marie, Marie takes the content of the email, applies the same hash, and gets 86,400. She checks my website, she sees the 86,400 ā therefore, sheās confident that the message has not been corrupted.
So, notice that if the message was corrupted ā and Iāve got an example here of āhallo,ā rather than the āhelloā ā you get a different number. And you can detect the corruption with this hash. So, this hash is too simple to work in a serious context like cryptocurrency. And the reason is that if you mix the order of the letters around you get the same hash.
So Iāll give the example of changing āhelloā into āohell,ā which has a different meaning but the same hash. OK. So, the second kind of new term here, which is a term you know, but in this context itās called a collision. So, a collision is where you have two different inputs, hello and ohell, that delivered the same hash. You want to avoid that.
So, we need to do something more complicated. And this is going to be the so-called SHA-256. So, thatās the third term I want you to remember from today ā SHA-256. Thatās secure hashing algorithm, invented by the NSA. You might be a little suspicious, given, for good reason, for the NSA, but this is open-source code. Itās been checked by many people. Thereās no back doors or anything like that; itās all very straightforward. And what we do is to take an arbitrary input, which could be an email or it could be a transaction, put it through this function ā and this is, as I say, a cryptographic hash ā and it delivers 256 bits, zeros and ones.
So, to be clear, this is not encryption. This is hashing, itās cryptographic hashing. Encryption is where you take a document, encrypt it, and then thereās a key to decrypt it. This is a one-way function. So, I could take something that is one word, and it turns into 256 bits. I could take something thatās 10 gigabytes ā it turns into 256 bits. So, weāre not going to be able to reverse the hash. OK? So, this is not encryption, it is hashing. So, what Iād like to do is to go to the internet and actually do some hashes to show you what this actually looks like.
So, Iāve typed in āhello, world.ā And let me calculate the hash thatās associated with this. And hopefully you can see this at the back. It is basically a code that is not zeros and ones. Itās in hexadecimal.
So, hexadecimal is zero to nine plus the first six letters of the alphabet. OK, so thatās unique. OK, so this is the 256 bits. And if I go and change this very slightly, so letās say I put a 0. So, notice the hash is 315F5. It starts with that. So, letās say I put a 0, and I recalculate the hash. Itās completely different ā 312AF, completely different.
And if I go and go back to the original and rehash, I get back to the 315F. OK, so this is the SHA-256. And let me just do one more here that Iām going to use a little later on. Letās say I put a number 4-2-5-0 afterwards and then hash. And notice that hash is a little unusual in that itās got four zeros at the beginning.
The probability of any zero or any letter is 1 over 16. So, the probability of getting four zeros is 1 over 16 times 1 over 16 times 1 over 16 times 1 over 16. So, thatās rare to actually get that. So, this rare hash is going to be important.
So, let me go back to my PowerPoint presentation and show you some more examples. So, the first one is a hash of the King James Bible. OK. So, I found it on the internet, just copied it into the same program, hit the hash button ā instantly I get that hash. And then, the second one is the Bible with the last word omitted ā āamen.ā ā itās gone. Notice, itās completely different.
And indeed, you can do a hash of a hash, and thatās what I did for the very last line. This stuff is crucial for any blockchain technology. But this is a general idea. Indeed, we can think of this in many different dimensions. I will talk about an application to email. Iāll talk about the application to Bitcoin.
People ask me a lot, can we undo the hash? Intuitively, it doesnāt make any sense that you can undo a hash because, as I said, if youāve got 256 zeros and ones, how can you feasibly invert that to get the Bible back? It just doesnāt make any sense.
But technically, you could do this. And itās by brute force, and you need to guess 2 to the power of 255 different combinations. And when I say infeasible, I really mean it. Because to do that isā¦ basically, the number of trials you have to do is equal to the number of atoms in the known universe. OK, so itās just infeasible ā so very, very secure.
OK, so let me return to the email example. So, now Iām going to send an email to Marie. I want to make sure itās secure. I take a hash of the document ā maybe itās not just a word, but itās a document that Iām sending ā I take a hash of that document, I post it on my website. Marie gets the document, drags it into the same program I showed you, gets the identical hash that Iāve got on my website. I am confident. The probability of collision is very, very low with a SHA-256.
OK, so this is a secure way to actually validate. So, this happens, actually, all the time. So you donāt even know itās happening. This happens when you send an email. So, I challenge you to go to your email program, whether itās Gmail or Outlook, go and look at properties, view the header of the email, and youāre going to see references to SHA-256, SHA-384 ā which is a longer one ā 384 bits. OK? Itās going to be there. Itās used routinely to guarantee that files are not corrupted.
OK, so I canāt resist showing this one. During the election, WikiLeaks was interfering with the electoral process and releasing Podestaās emails and things like that. At some point, the internet was cut off at the Ecuadorian embassy in London. And when that happened, three Tweets were sent out. And this is the story from the Wall Street Journal. It just so happened that was the same day that Pamela Anderson āvisitedā Julian.
And the Wall Street Journal basically says each one, and Iām showing one of them, began precommitment and then the number 1, 2, or 3 ā so thereās three of them ā followed by a short phrase and then an assortment of 64 letters and numbers. OK, those 64 letters and numbers are a SHA-256 hash.
So, you know that now. The reporter at the Wall Street Journal didnāt know that. So, this is not just any assortment; this is a hash. And the story missed the main point.
So, why would thisā¦ why would WikiLeaks say John Kerry, precommitment number one, and then deliver a hash? So, itās clear to me what the story is. And the story is that this hash proves that WikiLeaks has a document thatās very sensitive for John Kerry.
So, John Kerryā¦ actually within the governmentā¦. The government keeps hashes of all their documents, so itās very easy for them to do a search for this hash. And with this hash, it is proof that they actually have access to, potentially, a highly embarrassing document. So again, thereās many different uses for these hashes. And blockchain is going to use this in basically private and public implementations.
OK. So as I said, everything on the Bitcoin blockchain is public. And this is the same diagram I showed you before, where now the code that is linking the blocks is a SHA-256. So, these are just plain text transactions. And at the bottom thereās a SHA-256 that reappears at the top. Thatās the link. So, the SHA-256 is the linking mechanisms.
And let me show you a simplified example. So, this is with shorter hashes, but you kind of get the idea. So, you can see all the transactions. You can see the people that are transacting. And notice the way it works, weāve got a block 99. And thereās a hash of that block that appears at the first of the next block. And then this is hashed. And it appears at the beginning of block 1,001.
So, within block 1,000, I actually buy a car from John. So, you can see that Iām docked 17 Bitcoin. And John gets 17.
So now, suppose I go in and edit that block. And I change, very subtlyā¦ all Iām going to do is to flip the plus and the minus. OK, so now, I buy a car from John, but he pays me the 17. Itās a great deal.
OK, so I made a very subtle change. Iāve just switched the minus and the plus sign. But the implication is pretty severe because when that block is hashed, it delivers a different hash than the beginning of block 1,001. So immediately, the algorithm says this block is not valid. It goes out to the network and gets the correct block.
So, this is a way to ensure integrity. This is a way that we can prevent the rewriting of history and any credible hacking of the blockchain. So, itās a little more complicated than what Iāve described. So, itās not just a plain old hash like I did on the computer. Itās a special hash. So, we take the transactions and then we add a number, a magic number, and itās called a nonce. N-O-N-C-E, thatās the fourth word that might be different for you today. So, weāre going to add a number. And what weāre going to try to do is to get a special hash thatās got a lot of leading zeros. Thatās the idea.
And I did one for you where I put 4-2-5-0 and got four leading zeros. So, itās going to be difficult to get these leading zeros, and this is why we need the massive computing power. So, this is very important for security. And think of what weāre doing ā another way to think about this is youāve got five decks of cards, you shuffle them, and you try toā¦ the first five cards are aces of spades ā very unlikely. So, youāre going to have to do a lot of shuffling, and for what weāre doing, weāre going to have to do a lot hashing to try to get these leading zeros.
And thatās exactly what happens ā a huge amount of hashing. So, the current blockchain has 18 leading zeros. It is very improbable to actually find that winning hash. Indeed, the probability is about the same as winning the Powerball twice, like in a row. OK, so thereās a massive amount of power thatās actually behind this.
And interestingly, the algorithm is immune to increases in computing power. So, what it does is it targets a winning hash probabilistically every 10 minutes. If the hashes become found like, letās say, every 5 minutes, then automatically the difficulty is increased. So, instead of 18 zeros, maybe you go to 19 zeros. So, itās automatically adjusting so that the transaction blocks are done every 10 minutes.
So, this is approximately how this works. And the miners are actually the ones that are doing the hashing. And they are in a contest. And whoever wins or finds a hash with 18 leading zeros ā people go, itās posted, and itās very easy to verify. So, anybody can verify ā I can verify it here with the program I just showed you.
I just copy the transactions and the nonce that they use. And maybe itās like 2,435,016. Put that in. Run it through my program. I get the 18 zeros. It is verified. So, the miners are verifying the transactions, verifying that people actually have the cryptocurrency to spend. And then the miners are also securing these blocks. You might wonder why. Why do we need 18 zeros? Why do we need all of this computing power to actually secure this network? And the reason is that we donāt want people to go back and easily redo, block-by-block, the history of the blockchain. With 18 leading zeros or 17 leading zeros, itās just not feasible for anybody to actually go and do damage to the history. So, thatās the reason itās there. Itās trustless. We donāt need to trust anybody here. But it is cryptographically secure.
OK. So, this is also, I guess, important for other blockchains. So, I mentioned the Ethereum earlier. Ethereum blockchain actually is the same concept, where thereās hashing going on. They will actually switch their protocol in the future to a consensus mechanism called proof of stake. Iām not going to go into that today, but it is a topic of what I do in my course.
Also, I should mention that my course, all of my materials, are online. So, itās on my website. All of my PowerPoint decks, all of my lectures ā everything is online. So, if youāre interested in going a little deeper, this is available.
OK, so let me talk about private briefly before I get to some applications. So again, private is where you trust people. And one example that I gave earlier is the banks. The banks are working with legacy computing. Indeed, the most valuable coder today is one that knows COBOL, a language of the past, right? At least 35 years old. When I was an undergrad, they were using COBOL. But even then, it was being replaced by other languages.
So, it is a legacy infrastructure. Banks spend $200 billion a year maintaining the legacy architecture. What could blockchain potentially do? And check this out. This is a simple example: three banks ā A, B, and C ā and two customers. Banks do business with each other. Customers do business with potentially more than one bank.
And this is a simple network diagram. And itās really simple, three banks, two customers. Can you imagine a billion customers and 100,000 banks? So, this is really simple. Everybodyās got their own ledger. What can blockchain do? And this is what it can do. On the right is a simple ledger where everything is shared. OK, so very easy to deal with. And actually itās also interesting, my interaction with regulators. Initially, regulators were very negative on blockchain because they thought blockchain meant Bitcoin. And Bitcoin associated with Silk Road, and ransomware, and stuff like that.
When you showed the regulator this diagram, you can see the glitter in their eye. One place to look ā so they get access to, basically, all of the bankās records in one place. So, this is so simple. And all of the banks are working on some sort of blockchain technology. It might not look exactly like this, but you get the idea that this is a way to do away with the legacy architecture.
Itāll take a while to do, but some banks actually have this operational. And I point you to JP Morganās Quorum, which is a very interesting technology. And one thing you might think immediately, well, what? One ledger, I shouldnāt be able to see my competitorās transactions in this ledger. And Quorum actually solves this problem.
So, everything is in a blockchain. But you only get to see the transactions that you are party to. OK, so itās a great idea. It is operational. Itās not just an idea. It is operational. And it is also open source, OK, so itās available. So, very exciting.
So let me, before I go to my main applications, talk about an obvious application of blockchain. And this has to do with machine-to-machine transactions and payments. So, I see the internet in three different phases. One, the first phase, was just gathering information. You go to a new site, and you get the information. Or you go to Wikipedia, you get the information. The second phase of the internet was social, so social media, Facebook, Twitter, Instagram, stuff like that. The third phase we havenāt seen yet, but itās coming. And this is, basically, enabling machine-to-machine payments.
So, if you think today, it is very clunky to do payments on the internet. So you have to put credit card information in. And who knows how secure that is? Sometimes you even put bank account information in. And again, thatās even more dangerous in terms of security.
And notice that weāre doing the paying. Weāre not getting paid. Thereās no way currently, in a simple way, to actually be paid. There are things like PayPal, but the fees involved are significant. Credit card fees are very large, 3% ā you swipe at a gas station 7%. OK, so this is all because of the insecurity of these particular mechanisms. So basically, thereās no mechanism for me to charge for something. So, you download one of my research papers. I spent a long time working on that. I canāt monetize it. Even if I got 5 cents, that would help. But no. So, nobody is going to do a credit card for 5 cents.
So, what can we do here? And the key is HTTP 402. And you know 404. Everybodyās got a 404 error ā website not found. So, look up 402; 402 is built into HTTP. And it is forā¦. it is for digital micropayments, except thereās no ability to do that in the past. We have the ability to do that today. And one company thatās heavily into this is called 21.co. You should look them up. So, their idea is to enable this HTTP 402.
So in terms of payments, I said that itās hard to be paid. Well, actually, you can be paid for doing tasks. Amazon Turk is the leader in this., but it only works in the US and in India. And the payments you get are once a month. With this technology, the payments could be instant.
So, think about ā and I tell this to my students ā youāll hop into an Uber. You do a couple of surveys or tasks on your smartphone. Youāre paid $2.50 for each task. Thatās enough to pay for the Uber.
So again, this is like a machine-to-machine payment, instant basic pay for doing a task. So, another way to think about this is changing your view of email. So, think of email where, at the top of your inbox, youāve got friends, family, your work stuff. But thereās many other people that want to get to the top of your inbox. Well, theyāre going to have to pay for it. So, you set the price. You set the price to get to the top of your inbox. And when they send it, it instantly goes into your account. Letās say $10. And if you open the email, you get paid. And if you go to a website link, you get paid. This is a completely different model, and itās a model that basically makes email expensive, but not that expensive. So, you have a price thatās set extremely low, 1/10 of a cent, letās say. And that means anybody in the world wonāt be prevented from using email, but what it will do is to eliminate spam. Currently 66% of the email that comes into my university, duke.edu, never goes to any inbox. OK, it is just pure spam ā 66%. So again, you put these people out of business with this technology.
And we can extend this to the web ā so make the World Wide Web no longer free. Again, you have the very, very small price that people can pay. But again, it puts the people doing distributed denial of service attacks out of business. They cannot afford to do it. OK, and again, we free up bandwidth. It also allows people to monetize their content. And this is a big deal today, actually, especially in media. Itās very hard to monetize. Even the leader in paywall, New York Times ā 90% of the traffic that comes to the New York Times site are not subscribers. So, with a small fee, it allows media sites to actually generate some extra revenue, where maybe they can employ some fact checkers and editors. So, all of these are possible with this technology that is enabled with blockchain.
I am very negative on Facebook and Google. Becauseā¦ so currently, 80% of online advertising is basically with Google and Facebook. And the example on the side is Google AdWords. And this is, I think, not sustainable.
So, you do a search for āDallas truck accident lawyer.ā And you go to a particular website of that lawyer that is basically number one on the Google search. That lawyer pays Google $425. You get nothing. Thatās not sustainable. Thatās going to go away. Google is a little more diversified in their business. But Facebook isnāt. So, this is a short-term thing that will go away. And this idea of micropayments hits so many different industries.
Think of cellular companies ā AT&T, Verizon. This is going to be completely different. People will own the towers. You use the tower, you pay a small amount, 1 cent, 2 cents. You pay to directly to the owners of the tower. OK, these large companies are effectively middle people. And blockchain allows the disruption of the middle people.
So, itās not just this. Itās cloud computing as we know it today will not exist in the future. Computing in general, it is a wasted resource. The average desktop computer uses only a couple of minutes of full CPU a day. And that can be harnessed to basically do cloud computing, OK? But a different version, a distributed computing. OK, so this is a big deal in my opinion.
Let me talk about a few applications before we go to questions. This is a ballot for Brexit. And Brexit would never have happened if there was blockchain voting. And it turns out that the younger people were very remain, like stay. But they did not vote. And they didnāt vote because, oh, why should I spend hours going to the polling booth, standing in line, and doing this archaic check on a paper ballot? Why canāt I do that on my smartphone? Well, blockchain allows you to do it on your smartphone. So, weāre going to see applications with voting. Itās a low-hanging fruit. Itās also secure. You get instant results. Thereās no hanging chads. It is clear and secure.
The internet of things ā so some of the main blockchain applications are internet of things. This is my Nest, a picture of my Nest. I actually donāt think itās a good idea that somebody can hack into my Nest and set the temperature to 110 degrees. OK, so again, I want this so that only I can actually do the changes. And again, think of a lookup to a blockchain. Yes, this is my Nest. I can do a change.
So, if you think a Nest is one problem, think of it ā a self-driving car. Like, I definitely donāt want to get into a car like this and have somebody take it over. OK, this is very dangerous. So to me, blockchain has to be part of self-driving cars. OK, you do not want to take the risk of somebody hacking and taking control of your car when youāre in it.
This is an obvious application. It is a scandal today, what happens, especially with opiates in the US. These scripts are still used. People go into the office, they steal the script, they go fill multiple prescriptions. Again, this is such a simple application, where there is a prescription blockchain. Everybodyās got it. The doctor, effectively, gives you a token for a particular drug.
You can go to any drugstore to get it filled. You canāt sell it. And it expires. And it could be used only once. And itās in the blockchain. So you go into the pharmacy. The pharmacy looks up and says, yes, youāve got this token to spend on this drug. And itās done. So, this is a very straightforward application that solves a huge number of problems in terms of the social issues and the health issues induced by drug abuse.
Medical records ā no problem. Weāve got a blockchain application for it. So really, what weāre talking is, a large hospital might have two million patient records protected by a single password. That is just unsatisfactory. So, with blockchain, you take control of your own record; youāve got, effectively, a key or a password for your record.
So, if somebody hacks into the two million patient data, theyāre going to have to crack two million passwords. Thatās very unlikely. So, this solves an important privacy problem. And it solves the issue of you going to a different provider and them not being able to access your records.
Well, they can access your records now. You give them permission. You are the owner of your data.
Financial statements are a relic of the past ā annual statements, quarterly statements. An obvious blockchain application is for a company to use blockchain technology for, basically, their accounting. And then thereās an API that delivers the same sort of information that you would usually see in a quarterly statement but in real time.
And when you do that ā and there is actually a link to my paper here that won the Scroll ā you eliminate all these shenanigans that are happening at the end of the quarter or end of the year because everythingās real time. And in real time, people realize that thereās some noise. OK, so this is an application ā I actually think the main accounting firms are in a good place. I said I was negative on Facebook, but Iām positive on the accounting firms because they will still be used to validate transactions, not just financial transactions, but all types of transactions.
So, I buy the Nest. And thereās a blockchain for Nest. They will validate that I actually own the Nest. So, thereās a good business path for them in the future.
Property I already talked about. Digital twin is a very hot application of blockchain. And this is the idea that every single part, every single sensor reading, is put into a blockchain. So, then when you actually ā if thereās a problem with the jet engine, you actually look and you see that a part that was put in was not the part that was put in on the blockchain. Thatās fraud. And the trial is very swift. Youāve got the blockchain. It is telling the truth of history.
Itās also the case that itās easy to resell the engine because youāre handed the complete record that cannot be doctored with. OK, so you get rid of the so-called lemons problem, that you donāt know what the quality of the engine is. Well, youāve got all of the details. And this is just one example of a digital twin. It could be many other examples like this.
Fedcoin ā so I mentioned all the central banks are looking at blockchain. And it is remarkable to me that 78% of the value of US dollars today are in $100 bills ā 78%. Yeah, think about that. You go to a store. It says we do not accept $100 bills, or $50 sometimes. Yet 78% is in $100 bills.
So why? And itās pretty clear, thereās the stash of El Chapo. OK, so heās got a pile of $100s. And the two smaller stacks are two things, 10,000 yens and 500 euro notes. So this is a big problem. Again, blockchain can solve this problem. And it will likely be called Fedcoin or something like that. All of the central banks are pursuing blockchain applications.
The Bank of England is maybe the one thatās out ahead of everybody. And notice the paper that they put out. And itās very interesting. Look at the icons. So, you see the diamond? You see what? Diamonds and blockchain?
Well basically, the issue is the blood diamonds. So you want to be sure that the diamond actually is not a blood diamond. So, you actually laser in a code in the diamond. And you put that code in a blockchain, and it essentially verifies that the diamond is clean.
In the Middle East, see a passport. On the side, you see a power. So, people are using this for energy trading. IBMās got a contract to put the US power grid on blockchain. There are smaller applications, where people with solar panels are sharing their power on a peer-to-peer basis. Thereās no middle person. OK, so many applications here, including the cryptocurrency.
OK, so let me finish. This isā¦ in my course, we do the technical details, but we also do innovation projects. And in my course, itās kind of high-stress because 100% of the grade is on a 15-page pitch deck of a new company based upon blockchain technology. OK, itās high stress.
And these are some of them. I wonāt go through all of them. But let me just mention number one ā smart guns. So, it was in the press recently. Can you imagine a gun, where itās activated with your thumbprint just like your iPhone? So only you can fire the gun.
But think about the application for law enforcement. So, the smart gun again, is activated with the thumb. But itās also got GPS. It also can keep track of every single bullet fired. After the day, you put the gun in the rack. And whatever happened to that gun goes into a blockchain. And this basically eliminates a lot of the uncertainty as to what happened. We know exactly when the bullets were fired. And we know the direction, and the angle, and the person thatās pulling the trigger.
OK, so this is a very simple application. And maybe itās not a lot of money in this application. But it solves a problem. And I think it is promising. So, thereās many different ideas, and Iām always amazed. This is the third time Iāve taught the course, and I thought that the projects would just repeat the projects of the previous year. And I had student groups coming into my office proposingā¦ we canāt decide upon three ideas. And each one of the three would be different than the year before.
So, the message here is that this technology is not going to go away. Bitcoin and Ethereum might go away. But thatās just one application of blockchain technology. Weāve seen some of the low-hanging fruit in terms of financial applications, but thereās plenty of applications outside of finance. So any time, as I said, that security is important, where we need to verify ownership of any property, and if middle people are involved, this peer-to-peer technology can be very useful.
So, I will end it there. And I see weāve got lots of questions.
ELAINE CHENG: There are a few questions.
CAMPBELL R. HARVEY: OK, good.
ELAINE CHENG: Letās give Cam a hand for that, and weāll move on to questions.
[APPLAUSE]OK. Yeah. We have a lot of questions here, so weāll try to get through as many of them as we can. You talked a lot about the security of blockchain and how that security works. I think we have a couple of doubters still in the audience. I think theyāre just curious: Under what scenario would the blockchain be at risk from a hacking situation or a compromised situation? Maybe you can just talk to that a little bit.
CAMPBELL R. HARVEY: Yeah. So the main risk would be that ā you have to talk about it in two different ways. Number one, if itās a private blockchain, then it is potentially at risk. So, think of, letās say, 20 banks getting together, and then somehow somebody takes over the computers in 11 out of the 20 banks, they could cause some havoc in that private blockchain. I think itās unlikely that somebody could simultaneously take over the banksā computers for 11 of the 20, but nevertheless, thatās a possibility.
On a public blockchain like Bitcoin it is solid, right? So, the cryptographic hashing thatās necessary to actually go and start changing history ā itās just infeasible to think about rewriting history. But there could be other public blockchains that donāt have as much power behind them that could be susceptible to a nefarious actor coming in and disrupting. So, nothing is perfect. And I chose my words very carefully. I said itās infeasible to hack. Itās infeasible to undo a SHA-256, but itās not impossible. So, it is possible, itās just very unlikely.
ELAINE CHENG: Thanks. Just a little bit of a follow-up questionā¦ and there were some questions in here about, in the news, hearing about hacking of a Bitcoin. Maybe just addressing that and ā
CAMPBELL R. HARVEY: Sure. So, Bitcoin was in the news, I guess, for many negative reasons. So, Silk Road, for example, where you buy drugs with Bitcoin ā and it was closed down. And a lot of criminals tend to use Bitcoin, but they havenāt had the luxury of sitting at this conference and actually hearing my presentation. Because the complete record of whatever they do is in a blockchain. A criminal definitely doesnāt want that. So, you can do the initial transaction, so you pay $300 in ransomware. It goes to an address thatās well known. As soon as the criminal starts to spend that, we can probabilistically figure out who it is.
So, donāt think that Bitcoin is anonymous. Itās more anonymous than, letās say, a credit card. But itās not anonymous. Indeed, I would say that blockchain is the last mechanism for an illegal transaction that you would want. OK, again, as I said, the court case is very short. Hereās the record. Itās immutable. This is you? Uh, guilty. OK, so itās thatās the last thing you want to use.
And what I recommend ā well, itās actually weird to recommend things for illegal transactions ā but cash. So, cash is what you should use. Itās a big mistake. And WannaCry is in the news all the time about this ransomware that encrypts your data on your computer. There are three Bitcoin addresses that are given. People are watching that so carefully, I doubt that the money that they get will ever be spent, OK? Because as soon as they start spending, theyāre in trouble. OK, itās the same thing with Silk Road.
So, the other thing in the news was the so-called hack of Mt. Gox and an enormous amount of Bitcoin that were stolen. And people think that that is a hacking of the blockchain. It has nothing to do with the blockchain. It has to do with a third party that is acting as a bank. So keeping your codes in this bank ā and in the press, Iāve referred to this Mt. Gox as a bank. And think of a bank branch that has no security cameras, no employees. The doors are open. The vault is open. And you just walk in and take the codes. Thatās the level of security. Mt. Gox, it stands for Magic: The Gathering Online Exchange ā so a trading card exchange that happened to get lucky with Bitcoin. And people knew that they were not secure, and people kept their Bitcoin there, and the Bitcoin got stolen. OK, so this is a third party, and a very low-quality third party. With a new technology, youāre going to get situations like this.
In contrast, Coinbase, which is a Bitcoin and Ethereum bank ā you put a deposit with them, it is insured up to 99.8% of the value by Lloydās of London. So, if Lloydās fails, thatās another issue, but nevertheless, very, very secure. So, we see stuff like this. But for Bitcoin and for the cryptocurrency, itās not really an issue. Thereās no hacking. You can hack the third parties. But the blockchain is secure.
ELAINE CHENG: Thanks. OK, so a little bit slightly different. And we know that itās early days using this technology with blockchain, but itās essentially, as youāve described, open ledger. Can you talk a little bit about your thoughts related to privacy and any concerns with privacy or things that need to be considered in some of these blockchains around privacy?
CAMPBELL R. HARVEY: Yeah, sure. So, let me start with that voting application. So, it is a bit of a problem with a traditional blockchain application, because you cast your vote with your tokens. So, you get a token to vote. You canāt sell it. Itās kind of like the prescription ā you can vote once, you canāt sell it, you can vote anywhere.
But if this is kind of a government organized blockchain, they get to see how you voted. So itās probably not what you want. So again, this is a simple problem that has been solved, and itās solved with a different technology. And itās called a zero-knowledge proof. And my presentation, which I hope will be downloadable ā
ELAINE CHENG: You can get in on the app. Everybody has it on the app.
CAMPBELL R. HARVEY: That ā thereās an appendix on this. And essentially, what you can do is, you can prove that youāve got the right to cast the vote without actually revealing your identity. Itās a very simple and elegant way to deal with that. So, that is not an issue.
And I talked about JP Morganās Quorum, where you donāt want other parties seeing transactions, your own business. So again, you can have the record of everything in a blockchain. But you have a key to unlock the transactions that you are associated with. So, that ensures privacy. So, I think this is a great thing for privacy, just the cryptographic basis of this.
So, with cryptography, itās very much in favor of us. So, we can easily encrypt something. But itās really hard to decrypt if you donāt have a key. So, to actually go hack and to figure out the key is very, very difficult. In my medical example of the records, again, this actually helps privacy. Right now, everything is at risk. People can go in and gather this data thatās very sensitive and post it. So, I think that this actually has a nice balance in terms of the benefits of privacy and the costs.
ELAINE CHENG: Great. Thanks. OK, turning a little bit, we talked a little bit about the miners. And you talked a little bit, too, about the great benefits of getting rid of the middleman transaction costs. Can you talk a little bit about who will be the beneficiaries in establishing blockchains? Where will the profits go if there are any? And talk, maybe, just addressing some of the economics of what youāre saying.
CAMPBELL R. HARVEY: Yeah, so basically, what I recommend for every company, they need to have one person, at least, thatās familiar with blockchain, so a so-called blockchain czar. And that person is in charge of a couple of things. One is kind of an educational function, so a larger number of people in the company are educated on this technology. Number two, they need to figure out whether their business or part of their business is going to be disrupted with this technology. So, what are the weak points? What could we be disrupted on?
And then the last part is, what are the opportunities here? So, can we do something differently? Can we use a blockchain for our supply chain because the supply chain is causing a lot of problems? And you can you see this especially with food recalls, where somebody gets sick somewhere and they have to recall food over multiple states, right? With blockchain, you would isolate the particular stores that you need to recall. OK, so itās a huge area in supply chain in actually implementing this.
So again, there will be losers. It is clear. But the beneficiaries are mainly us, the consumer. This means that weāll be able to do things differently. This kind of machine-to-machine payments is another big deal. And you can imagine that people could make a lot of money ā valuable people like everybody here. This is another source of income. And again, itās directed to you rather than Facebook or Google. So, you earn the money for the information that you offer up.
So right now, itās very inefficient. So, Google will kind of probabilistically identify certain characteristics of you. And thatās how they do the online auctions for the ads. So, the ad comes in. Theyāve seen what youāve searched before. And it is pushed to you. This is completely different than you actually offering your profile up, saying this is what Iām interested in. This is my demographic profile. You want to get to me, get to me directly? Youāve got to pay me.
OK, so these are pretty strong implications. It totally disrupts the usual way of thinking about marketing. Remember I said this course is not just a finance course? It is a marketing course. It is an operations course. It is an accounting course.
This idea is so general that it affects so many parts of business. But you need a blockchain czar at your firm. The consultants love this. So, all of the consultants have blockchain teams. And basically what they do, they go into the company and do the exercise that I just suggested. Said this is what you can do with blockchain. And, oh, pay us and weāll implement it for you. OK, so they are basically playing the middleperson role. I think you can actually do this differently. Get somebody within your firm, designate them.
I remember one of my students took a summer job, so took the course in first year, took a summer job at a major law firm in New York. And itās just like itās a large law firm, many different interns. And he was doing just the boring stuff you usually do as an intern at a law firm. And then heās tapped on the shoulder. Come with me.
And heās taken into the senior partnerās office. He never even expected to meet the senior partner. And in the office, thereās somebody sitting, and he canāt see the face. But when the person turns around, itās the CEO of one of the top five banks in the world. And the senior partner says we know you took this blockchain course. Explain it to us. Hereās a whiteboard.
[LAUGHTER]Right, thatās the sort of power thatās possible here. So, that student got an offer ā full time. And I know other students that have taken my course, they go in and quickly people realize they know something that everybody needs to know but they donāt know. And that gives you a huge amount of power to kind of do things.
ELAINE CHENG: OK, hereās another one. Weāve been extolling the virtues of the blockchain. Can you talk a little bit about maybe what you think the greatest deterrents are for adoption? Or whatās sort of blocking this happening? And maybe itās a little bit of just understanding, but anything else you could say in terms of the blockages.
CAMPBELL R. HARVEY: Yeah, so this is a great issue. The first thing is that this technology is very young. So, thatās clear to everybody. And part of the reason Iām so excited about teaching this is that I like to teach things that will be relevant in the future. And thereās a lot of hype too. So, in my course ā and I donāt mean to hype blockchain, though it might seem like it. Thatās definitely not the case. You need to know ā and I said right at the beginning of the presentation ā you need to know the type of application. You need to be able to solve important problems. OK, so you need to be able to actually do that.
So, I think that the so-called killer app is where people are using the technology, but they donāt even know that theyāre actually using it. So, it might be youāve got your debit card, youāre swiping, youāre paying in US dollars to a merchant, but in the background, after that swipe, the dollars are translated into a cryptocurrency. The cryptocurrency is automatically transferred to the merchant and then translated back into dollars.
You donāt even know itās happening. And that technology exists today to do in a very cheap way. The merchants would love for this to happen, because they are the ones that have to pay the 3%. Some of the other kind of areasā¦ we thought initially that this would get a lot of traction with money transfer because money transfer is so expensive. Itās ridiculous. These firms like Western Union, 10% of what youāre transferring is their fee. So, we thought that would be kind of low -hanging fruit for people in developed countries transferring to emerging markets.
But a lot of the traction now is people in countries that are under stress, like Venezuela or even China, because itās hard to transfer money out of China. So, thereās all this application that are possible today. But I think that it just has to be simple. There is a barrier to entry to really understanding this. I didnāt have to do the SHA-256. But I really wanted you to see that, so when you see it in the Wall Street Journal, you know what it is.
So you can have an even higher level understanding of this. But for this group, I think you need a deeper level understanding. And it helps you figure out what the applications will be that are possible, so everybody can be an innovator.
And the first time I taught the course, I had a mixture of business students, law students, engineers, and undergrads in computer science. And I was so nervous about putting the MBAs together with the computer scientists, the undergrads, right? I thought thereād be a lot of tension. But quickly there was no tension. The computer science students were a little nervous because they said Professor Harvey, does this mean we have to do all the coding? I said, no, you donāt need to do any coding.
So, there was a good synergy in that the computer science students had the techniques and many applications, but they didnāt know what was a good business application. So, they really leaned on the business students for their knowledge of a viable idea thatās actually profitable. And then the business students actually were using the computer science students, is this feasible to even do? So, you need this mixture. And I think thatās very important.
And indeed, when we have guest speakers in for my course, it is amazing that some of the leading people in the blockchain application space for the consulting firms donāt have a technical background. Theyāre not computer scientists, but they have a good sense. They can pick this up, and theyāve got a good sense of where this will apply in a profitable fashion.
ELAINE CHENG: Great. Kind of on that same train of thinking around application and where will these applications turn up, are you seeing any applications in the government around perhaps utilities, or services to citizens, and so forth? I know we talked a little bit about voting, but anything beyond that that youāre seeing?
CAMPBELL R. HARVEY: Yes, and thereās so many possible applications. For example, one of my projects was on government benefit programs. It is remarkable, the amount of waste, where people are being paid unemployment insurance when they have a job. OK, this technology makes it way more efficient for this to actually happen. So, many different levels of government are looking at this technology to improve disbursements and things like that.
Supply chain, I already mentioned. Again, itās a nightmare of corruption. Maybe not as much in the US, but in other countries, it is a nightmare of corruption. Again, you have a supply chain blockchain. You can trace everything throughout. And it is secure. And if there is any funneling, then you see it right in that chain. So, governments are very interested in this.
ELAINE CHENG: Great. OK, we had a couple of questions. This change is a little bitā¦ the track about, if weāre thinking about all this distributed computing, what kind of impact do we think thatās going to have on infrastructure, computing infrastructure? Do you see any concerns there, anything thatās different that needs to happen or change as a result of that?
CAMPBELL R. HARVEY: Yeah, so as I said, with the machine-to-machine transactions, this enables many different things. So, one of the cryptos that is recently launched ā actually, I added to my glossary. Iāve got this glossary. Iāll put a plug in. Itās Harveyās Financial Glossary in the iTunes store. I had to add a word. Iāve got 9,000 terms, but I had to add this word ā I-C-O. So you know what IPO is, right? ICO is initial coin offering.
So, one of them that I followed quite closely is Gollum, as in The Lord of the Rings character. So, Gollum launched a coin. And basically this coin has got a particular use. And that is this computing application. So, you basically rent out, letās say overnight, your CPU, and youāre paid in this cryptocurrency, and programs are run on that computer. Thereās another coin thatās out there that is similar, Storj. And you can guess what it is. It is using some of your unused disk space.
So, youāve got a terabyte drive ā you can afford to essentially rent out 200 gigabytes. You get paid for it instantly. So again, this is happening. There are also very interesting things happening that I wish I had more time to talk about. The Chicago Mercantile Exchange, which I noticed they had a booth here, in the Royal Mint group are issuing a crypto based on gold. So, the idea is you take gold. Itās in the vault at the mint. And then you issue a coin that gives you the right to a fraction of that supply.
So, anybody could easily buy gold. You donāt need to buy an ETF, you donāt need to buy bullion, or coins. You can go buy 25 cents worth of gold instantly, with very low transaction fees. And indeed, that crypto will not be as volatile as, letās say Bitcoin or Ethereum. Bitcoinās like six times the volatility of gold.
So, this coin will have a volatility that is gold. But you can think of using that for any transaction. So, you go in and pay for your groceries at Whole Foods in gold. Itās a great idea. But if you think kind of beyond this idea, think of doing this for anything. So you could take, letās say a million shares of IBM. You put it in a secure vault. And then you issue a coin based upon IBM. OK, then in your wallet, youāve got regular dollars. Youāve got your gold. You can pay for your groceries with a fraction of a share of IBM.
So, the vision that I never expected when I started out ā this is the vision of a barter economy re-emerging. Wow! So, your phoneās got all the assets that are liquid, that have coin basically issued on them. And youāve got your choice. So, thereās a lot of upside here that I havenāt explored in this presentation.
ELAINE CHENG: OK, I think we have time for one more quick question before we quit. So, Iāll end it with something kind of fun and maybe apropos for being here in the town of the US founding fathers. What do you think Alexander Hamilton would say about Bitcoin and the blockchain?
CAMPBELL R. HARVEY: Yeah, I think he would love it. And the person that I know would definitely love it is Milton Friedman, who actually advocated a rule in terms of the money supply. Keep it to a particular percentage growth every single year. In the Bitcoin algorithm, the amount of new Bitcoin created ends in 2140. Nothing new is created. So, itās a deflationary currency in a way. Itās just a rule. Itās an algo. So, I think both of them would be OK with that because it really takes ā when weāre talking about these public crypto, it takes the government out of the equation. The Fed, I doubt, would ever adopt something like Bitcoin or Ethereum. But when they do the Fedcoin, it does give them certain advantages.
So, the so-called helicopter drop of money for people is a really easy. Itās one line of code. Transfer $100 into every single citizenās wallet. Youāre done. OK, so this is possible. You can execute monetary policy very, very quickly.
The other thing that I remember, during this episode where Tim Cook refused to unlock an iPhone ā do you remember that last year? And they threatened to put him in jail. And I told my students it would be the greatest thing for the only Duke CEO in the Fortune 500 to go to jail for this. But I also was shaking my head because to unlock an iPhone is trivial. My computer science students can do that. So, itās kind of like questioning the FBIās capabilities to actually do this? So, I thought there was some other game actually going on there.
But this is important. President Obama actually made a remark on this. And he said, well you know, thereās pluses and minuses here. And he didnāt think that it would be a good idea for, potentially, every citizen to have a Swiss bank account on their smartphone. OK, so I put that quote up in my class. And I said what do you think about that? And the student reaction is pretty swift. He doesnāt understand blockchain, because itās not a Swiss bank account. You have Swiss bank on your smartphone. Itās your own bank. Everybodyās the same.
So, this is what this enables. And indeed, if you think, there are two billion people in the world right now that are unbanked. Thereās a technology in Kenya right now that two-thirds of the GDP goes through, that basically uses your mobile phone to do transactions. And it is the mobile phone provider that is enabling the transfer. And they charge fairly large fees.
This technology allows everybody to be banked. And itās easy to download these wallets, to do the transactions. It puts people that couldnāt usually access world markets into the game. It also allows people in developing countries ā youāre in a village, youāve got 190 IQ, but you donāt have the equality of opportunity, thereās no school. But they have a smartphone. Indeed, people buy a smartphone often before running water ā a smartphone and a small solar panel. OK, so the ability to actually do some tasks, to write some code, to be compensated for it directly just opens up so many possibilities.
I talk about ā I talked about earlier kind of driving by the cell phone tower and paying somebody that owns cell phone tower. Well, it might not be a person. It could be a group of people that actually own the cell phone tower. You drive by, and youāre paid instantly.
So, maybe you invest. Instead of buying 100 shares of IBM, you buy a piece of a self-driving Uber. And again, somebody gets in that car. They pay instantly. Money is transferred to your account instantly. So, the share economy is absolutely looking for this technology. Thereās a lot of upside. But again, I do want to caution a bit, there is also hype. So, people donāt understand the technology. They create an application that looks really hot. But given what you know today, I think that you can actually go to some of those applications and say, well, this isnāt really a good idea, so thatās not really solving a problem.
So, the applications that are big winners are the ones where thereās a big problem being solved. So, we will see this, and over the next few years, many different applications ā itās going to get simpler. But for those of us that are actually thinking of investing or making strategic decisions at their firms in terms of what to do for the future, we need to know much more about this technology.
So, I encourage you to actually go to my website, take a look at beyond the first lecture. I go into much more detail, many more applications, and I think itās a good investment in your time. Indeed, the CFA Institute is great at continuing education. So, you get your certification, but thereās always new stuff thatās coming out. Thereās some depreciation in your CFA degree. And itās up to you to actually continue to educate yourself. And if you donāt, you might get left behind by somebody disrupting you.
ELAINE CHENG: All right, thank you so much. Letās give Cam a round of applause ā a great overview.
This article was originally published at the CFA Institute's Enterprising Investor Bog.