Flashcards: Bitcoin Industry Landscape (Class 4)
Use these for Active Recall. Try to answer before looking at the solution.
Q1: What is the “Blockchain not Bitcoin” fallacy?
A: The attempt by banks and corporations to adopt the database structure (Blockchain) while rejecting the incentive token (Bitcoin). Without a token to incentivize decentralized security, a blockchain is just a slow, inefficient centralized database.
Q2: What does “Legal Arbitrage” refer to in the “Crypto” era?
A: It refers to projects using the term “Crypto” to offer what are essentially centralized securities or “stock” (ICO boom) while evading the regulations that apply to traditional finance by claiming they are “decentralized.”
Q3: What are “Federated Models” in the security spectrum?
A: These sit between full custody and full sovereignty. In a federation (like Liquid or some E-cash mints), you trust a consortium or group of entities rather than a single company. It improves privacy and convenience but requires some trust.
Q4: Contrast Base Layer security with Layer 2 security.
A: Base Layer sovereignty requires running your own node and holding your own keys (the most secure but slowest). Layer 2 (like Lightning) provides instant, cheap transactions but introduces operational risks (e.g., needing to be online to receive or monitor for fraud).
Q5: What is “Client-Side Validation”?
A: A scaling method where the “state” of an asset (who owns what) is kept off-chain by the users involved. Only a cryptographic commitment (a “receipt”) is anchored to the Bitcoin Timechain. This prevents bloating the base layer with data.
Q6: How do RGB and Taproot Assets use Bitcoin?
A: They use the Bitcoin Timechain as an anchor. They allow users to represent real-world assets like stablecoins or stocks using Bitcoin’s security without requiring Bitcoin nodes to understand or validate those specific assets.
Q7: Why is building a business around Bitcoin fundamentally difficult?
A: Because Bitcoin was designed precisely to eliminate middlemen. Most traditional business models rely on being a middleman. To succeed in Bitcoin, you must provide infrastructure or services that users cannot easily do for themselves.
Q8: Name three genuine “hard” business models in the Bitcoin space.
A:
- Exchanges: On-ramps and off-ramps (Financial service tolls).
- Infrastructure: Developing hardware wallets or specialized mining rigs.
- Liquidity Services (LSPs): Providing routing liquidity for the Lightning Network.
Q9: What is the “Silicon Valley Friction” in the Bitcoin ecosystem?
A: The clash between the Web2 “move fast and break things” mentality (centralized control, data monetization) and the Bitcoin philosophy of “extreme stability, privacy, and decentralization.”
Q10: What is the primary role of “Layer 1” in the modular network stack?
A: Layer 1 (The Timechain) acts as the final settlement layer. It provides the maximum security and finality for the entire ecosystem, while all high-speed or complex business logic happens on higher layers (L2, L3).
Q11: What is “State Bloat” and why do we want to avoid it on-chain?
A: State Bloat is the accumulation of non-essential data on every node in the network. If Bitcoin nodes have to store and verify every trivial token transaction or piece of metadata, the cost of running a node increases, leading to centralization.
Q12: How does “Client-Side Validation” (CSV) prevent State Bloat?
A: By keeping the specific data and history of an asset (like a stablecoin or security) off-chain. Only those participating in the transaction verify the data, while the main chain only stores a tiny cryptographic commitment.
Q13: In CSV, who is responsible for verifying the history of an asset?
A: The clients (users) involved in the transaction. If Alice sendsBob an asset, Bob is responsible for verifying the cryptographic proof Alice provides to ensure the asset’s history is valid.
Q14: What are the three “Easy” (but harmful) business models Giacomo warns against?
A:
- Selling Customer Data: Profiting by violating user privacy.
- Printing Shitcoins: Minting centralized tokens to fund projects without providing real value.
- Illicit Activity: Using the tech for illegal acts like ransomware or fraud.
Q15: What is the role of an ASP in the Ark protocol?
A: An ASP (Ark Service Provider) manages the liquidity and bundles off-chain transactions (Virtual UTXOs) for users, allowing them to use the L2 without manual channel management.
Q16: How does “Legal Arbitrage” specifically apply to ICOs?
A: It allows promoters to sell what are effectively unregistered securities to the public by claiming that the “blockchain” or “decentralized” nature of the project exempts it from traditional investor protection laws.
Q17: What does Giacomo mean by “Knowledge/Education Broker” as a business model?
A: It involves selling expertise, workshops, and intelligence to traditional industries and institutions that are struggling to understand and adapt to the transition toward a Bitcoin-based world.
Q18: Why is “Selling Customer Data” considered a non-viable model in a privacy-focused ecosystem?
A: Because Bitcoin was built to restore financial privacy. Business models that rely on surveillance and data harvesting are structurally opposed to the technological trends toward encryption and user sovereignty.
Q19: What is the “Bitcoin Anchor” in the context of RGB?
A: It is a standard Bitcoin transaction that contains a hidden cryptographic hash representing the state of an RGB asset. It ensures the asset cannot be double-spent without the Bitcoin network needing to know the asset exists.
Q20: Why do banks and corporations prefer “Blockchain” over “Bitcoin”?
A: Because they want the efficiency gains of distributed ledgers while maintaining the ability to control, censor, and inflate the monetary unit—something they cannot do with the decentralized, immutable asset that is Bitcoin.