Kieran is a current second-year law student at the University of Denver Sturm College of Law. Kieran was born and raised in the Aspen Valley. He graduated from the University of Colorado, Boulder, with a dual degree in international affairs and German.
Kieran's legal interest's are focused on venture and private equity funding, emerging technologies, and general corporate governance.
Outside of school Kieran enjoys all things Colorado. Skiing, backpacking, hiking, and craft beer are at the top of his list.
On January 7th Coinbase paused trading on Ethereum Classic (ETC) after it fell victim to a 51% attack. The attack resulted in over $500,000 of ETC being spent twice (Olga Kharif, Bloomberg Law). To appreciate what this means for the ETC mining community, two things must be understood: Hash rates and a 51% attack.
“Hash rates” or “hash power” refers to the total computing power of a decentralized network. Proof of Work (PoW) blockchains, like Bitcoin and Ethereum, are driven by miners “hashing,” which is essentially solving complicated math problems. (Bisade Asolo, MyCryptopedia).
Last month the Securities and Exchange Commission (SEC) obtained a permanent officer-and-director and penny stock bar against Tomahawk Exploration LLC founder, David T. Laurance, for perpetrating a fraudulent initial coin offering. (SEC Press Release). On its face, the decision shows the SEC merely enforcing its previous statements that anything resembling a security will be labeled as such and regulated under the Securities Act. The ruling, however, extends the umbrella of SEC oversight to explicitly include “Bounty Programs”—a mainstay practice for many initial offerings.
The regulatory landscape for cryptocurrencies is fast paced, ever-changing, and hard to pin down (see Element Group report). To understand why governments are interested in regulating cryptocurrencies, background about their potential function is necessary. Cryptocurrencies enormous potential comes from the use of “public ledgers” which, through a complicated application of cryptology and software, reduce transaction costs associated with value transfer by creating independently verifiable transaction validations. The public ledger system, however, only documents transactions and ownership. The only identity recorded on the ledger is "a set of letters and numbers . . . representing the [user's] public cryptocurrency address."