Cryptocurrency: Why Lost or Stolen Coins Must Be Documented

As the rise of the popularity of cryptocurrency barrels toward a paradigm shift in the economy, some traditional issues, as it relates to crypto being an asset, begin to surface. This includes the implications of your responsibilities when that asset is stolen or otherwise lost and unrecoverable. In 2014, the … Read More

Bitcoin Usage Impacting Iranian Uprising?

Bitcoin and more privacy powerful cryptocurrencies are flexing their muscles during the current round of uprisings in Iran in what may become the first recorded political disruption where cryptocurrencies end up playing a major role. Among other stated reasons, many claim frustration with current economic conditions as one of the … Read More

Bitcoin: An Introduction to Cryptocurrency – The Video

This video provides information to help attorneys understand cryptocurrency, such as bitcoin, and the underlying technology, the blockchain.  Bitcoin and other cryptocurrencies have recently been associated with different frauds, including drug dealing, money laundering, and extortion, but also provide a means for individuals to conceal assets, such as in divorce … Read More

An Introduction to Cryptocurrency

Cryptocurrency is poised to revolutionize modern monetary practices, allowing for a universal form of exchange. At some point in the past, a decentralized system of exchange was just a musing relegated to forums populated by a handful of cryptographers; then, in 2008, some messages appeared in a cryptography forum claiming … Read More

Bitcoin’s Blockchain: The Distributed Ledger of Bitcoins

The previous article provided an introduction to Cryptocurrency, as well as an outline of the current monetary exchange system. The bitcoin currency has a similar exchange system, referred to as Bitcoin, as that of physical currency, but there are some key differences to note.  The central reserve bank providing various … Read More

Anonymity and Cryptofraud on the Blockchain

Bitcoin enables anonymous transactions between a sender and a receiver by allowing each one to know only the public key. The possibility of working backwards from a public key to a private key, in an attempt to access someone else’s digital signature and sign transactions as the private key holder, … Read More