The term decentralized finance, or DeFi, goes back to a Telegram chat in 2018. Thats when a group of software developers and entrepreneurs were trying to decide what to call their movement of new-breed financial services that would be automated, built on a blockchain, and capable of stripping out traditional banks.
Three years later and DeFi is big business. A user with a crypto wallet can trade digital assets, get loans, or take out insurance, among many other things. Some $90 billion of collateral is locked up in these services, and more than 10 million people have downloaded MetaMask, one of the most popular digital wallets used to open up access to these networks.
The roots of decentralized finance come from the 2008 bitcoin whitepaper that set out the framework for a novel system for digital cash; those creation exploded into something bigger when Ethereum was invented a few years later. Bitcoin wanted to be peer-to-peer money, Camila Russo, founder of the crypto news service The Defiant, wrote in her book The Infinite Machine. Etherum wanted to be peer-to-peer everything.
DeFi is an amalgam of cryptography, finance, and software development, and it tends to be shrouded with its own lexicon and jargon. Lets take it one piece at a time.
One of the core tenants of decentralized finance is that its, well, decentralized. Take bitcoin, for example: The original crypto asset is basically a ledger (its blockchain) that is decentralized because the transactions are recorded in databases on many different computers. That single record (stored across many databases) is secured with cryptography and the computers keep tabs on each other to make sure it hasnt been tampered with.
Decentralization is part of what makes bitcoin hard to kill. No single party is in charge, so its nearly impossible for someone to go rogue and change the rules that govern the virtual coin. Likewise, even if a government manages to prevent a bunch of computers from supporting bitcoin, the digital asset can continue functioning because other computers on the network retain a full record of transactions and can carry on running the show.
Story continues
DeFi takes this concept a step further. Decentralized exchanges and lending systems use blockchains like the Ethereum network, which was proposed by Canadian-Russian programmer Vitalik Buterin in 2013. Whereas the bitcoin blockchain was designed to keep track of bitcoin transactions, Ethereums blockchain was created to host programs. Think of Ethereum as a decentralized computer that software developers can make applications (dApps) for. The computers that provide processing power for Ethereum are rewarded with ether, which is now the second-most valuable crypto asset behind bitcoin.
Like bitcoin, the Ethereum network is hard to shut down or corrupt. Anyone with an internet connection can access it.
The decision making, or governance, at DeFi organizationsfrom the fees they charge users to the products they offeris often meant to be decentralized. (If the US political system is a representative democracy, think of DeFi as direct democracy.) A single person or a small group of people might be driving a decentralized application at inception, but they often seek to step away as the project gains momentum, handing control to the community that uses it. That transition could be in the form of a decentralized autonomous organization (DAO), which has its rules and regulations embedded in programming code and may issue governance tokens, which gives holders of those coins say in decisions.
One of bitcoin's key innovations was the capacity for two users to make digital payments directly with one another. This is easy to do in the physical world using paper or metal money. But until bitcoin came along, the only way to do so electronically was through a bank or payment company like PayPal.
Going through these third parties leaves a digital footprint that can be surveilled, and those companies could potentially be "censored" by the governmenti.e. pressured to prevent transactions for political or other reasons. Bitcoin was envisioned to get around this, as a digital form of cash for peer-to-peer payments.
DeFi apps can also be peer-to-peer. In a traditional stock-trading transaction, an order might be processed through a series of intermediariesa broker and an exchange, among otherswhile the shares themselves are held at a custody bank, which is expected to keep the securities from getting lost or stolen.
By contrast, a DeFi exchange (DEX) doesn't have those intermediaries. If you use Uniswap, a decentralized exchange built on the Ethereum platform, to trade crypto tokens, those assets will end up right in your crypto wallet, facilitated by Uniswap's automated programs known as smart contracts. That means there are fewer parties taking a cut of your transaction.
Blockchain has enabled a series of digital gold rushes since it was invented 13 years ago. Two of them are initial coin offerings (ICOs) and nonfungible tokens (NFTs):
ICOs are a type of crowdfunding, and they're often used to raise money for open-source software projects. In exchange for capital, ICO investors get a unique token that might give them access to the software's special features... or might not give them access to much at all.
ICOs can sound a little bit like a stock offeringtoo much like stock offerings, in fact, for the US Securities and Exchange Commission; coin offerings may lack guardrails like disclosure and auditing that an initial public offering (IPO) would be expected to provide in the regulated stock market.
ICOs raised more than $7 billion in 2018, before plunging around 95% to $371 million in 2019, the latest year data was available, as regulators cracked down, according to CB Insights.
NFTs are kind of like a limited-edition trading cardonly online. Just as blockchain enables users to prove ownership of their bitcoin holdings, so too does it enable people to make unique digital assets like collectibles and art. One of the best known NFT sales was a work by Beeplethe artist also known as Mike Winkelmannwho sold a collage through an auction at Christie's for $69 million. Unlike a music MP3, which can be copy-and-pasted to infinity, NFTs are designed to be one of a kind, and to have one owner at a time.
A digital art fair in Hong Kong with works by Andy Warhol and Mike Winkelmann.
These acronyms are more than just a gold rush, says Matthew Leising, author of Out of the Ether. ICOs gave startups and software developers a way to raise money without the help of an investment bank or the backing of a venture capital firm. Likewise, NFTs can give musicians and visual artists a new way to monetize their work. "NFTs are really interesting because they've proven that a digital item can be scarce," Leising says.
DeFi's strength can also be its weakness:
Decentralization makes DeFi difficult to censor or stamp out, but it requires some heavy-duty computing. Maintaining a database and records across a network of many computers slows things down and can make transactions more expensive. Ethereum is the most popular blockchain for DeFi applications, but the sheer amount of computing now taking place is driving up fees and bogging down the network. As Ethereum developers try to find ways to make it more scalable, other chains like Solana and Avalanche are picking up momentum. "It's genuinely hard to get performance out of blockchains," says Emin Gn Sirer, a computer scientist at Cornell University and an advisor to Avalanche.
DeFi strips out intermediaries like custody banks, which are expected to keep assets (usually digital tokens) safe. That means you don't have to worry about a financial institution failing and taking your holdings with itor a government seizing your tokens and confiscating them. On the other hand, the only thing keeping your holdings safe is you and your passcode. If you lose that passcode (or someone steals it), your assets are gone for good.
The DeFi upstarts often purport to be available to anyone. You may be able to get a loan or trade virtual coins without traditional financial credentials like identification or a credit score. That freedom promises to extend financial services to parts of the world that haven't always had them, or where the services are expensive or prone to fraud or confiscation. But you can easily see the downside: If there's no entity keeping track of who is using a service or where they are located, the systems could be used by criminals or run counter to sanctions. The regulatory crackdown has already begun.
Blockchains have proven pretty tough to crackbut the smart contracts and apps that run on top of those chains are only as smart as the people who designed them. The code is typically open-source, which means it's there for everyone to see and to innovate with, but that also makes it easier for hackers to attack. Much more programming code these days is audited for bugs and vulnerabilities, and a growing number of people understand the need for formal verification (a process that uses algorithms to analyze other algorithms for glitches), but plenty of money is still going into code that hasn't been shored up in that way, Cornell's Sirer said.
Uniswap, a decentralized exchange (DEX), was created by Hayden Adams, a mechanical engineer from New York. The idea sprung from posts written by Ethereum founder Buterin about developing an automated market maker and decentralized exchange. These days, Uniswap facilitates $1 billion or more in daily crypto trading, and its governance tokens, UNI, have a market value of about $12 billion according to CoinGecko, a crypto-data website.
Aave was founded by law student Stani Kulechov in 2017 (originally called ETHLend). The platform lets users lend and borrow crypto tokens; users have put about $14 billion worth of collateral for loans on the network, according to Defi Pulse.
MakerDAO is a lending and borrowing platform that uses Dai, a stablecoin linked to the US dollar. MakerDAO was started in 2014 and co-founded by Rune Christensen. On its website, MakerDao says it's one of the largest decentralized applications on the Ethereum blockchain and the first DeFi application to get serious adoption. Users have put up about $6 billion of collateral on the system.
Sign up for the Quartz Daily Brief, our free daily newsletter with the worlds most important and interesting news.
More stories from Quartz:
Visit link:
Everything you need to know about DeFi - Yahoo Finance
- To Foil NSA Spies, Encrypt Everything [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- What is cryptography? - A Word Definition From the ... [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- cryptography: Definition from Answers.com [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Cryptography - Wikipedia, the free encyclopedia [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Cryptography - CISSP Domain 07 - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Cryptography Advanced Encryption Standard AES Tutorial,fips 197 - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Faraday Project for Network Security and Cryptography - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- An Overview of Cryptography - Gary C. Kessler [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- An Open Letter from US Researchers in Cryptography and ... [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Gambling with Secrets Part 4 8 Private Key Cryptography - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Gambling with Secrets Part 1 8 What is Cryptography - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Public Key Cryptography RSA Encryption Algorithm - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Public Key Cryptography Diffie Hellman Key Exchange - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Intro to Cryptography - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Caesar Cipher Ancient Cryptography - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- 50 top US cyber security experts write open letter calling for end to NSA 'snoop-ops' [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- Prominent cryptography and security researchers deplore NSA's surveillance activities [Last Updated On: January 27th, 2014] [Originally Added On: January 27th, 2014]
- Obama Stays Silent on Reform of NSA's Crypto Subversion [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Cryptography experts sign open letter against NSA surveillance [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- US crypto researchers to NSA: If you must track, track responsibly [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Java Cryptography Architecture (JCA) Overview - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Cryptography - Part 1 - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Cryptography - Part 2 - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- International Journal on Cryptography and Information Security ( IJCIS) - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Bitcoin Lowdown: Block Chain Cryptography Trumps Human Trust, Deal With It - Video [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- Bitcoin Lowdown: Block Chain Cryptography Trumps Human Trust - Video [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- NSA and GCHQ spoofed LinkedIn to hack Belgian cryptography professor [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Lecture 17: Elliptic Curve Cryptography (ECC) - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Cryptography event - Pravega 2014 - Video [Last Updated On: February 3rd, 2014] [Originally Added On: February 3rd, 2014]
- Lecture 1: Introduction to Cryptography - Video [Last Updated On: February 3rd, 2014] [Originally Added On: February 3rd, 2014]
- US and UK spy agencies accused of swoop on Belgian cryptography expert [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Conceal: Facebook's new Java APIs for cryptography on Android [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Cryptography Apps: How To Keep Your Personal Info Private [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Cryptography Breakthrough Could Make Software Unhackable [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Oi, Android devs! Facebook wants your apps to be more secure [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Lecture 19: Elgamal Digital Signature - Video [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Lecture 18: Digital Signatures and Security Services - Video [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Cryptography 1. List some of the attacks on the Diffie ... [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Cryptography Breakthrough Could Make Software Unhackable ... [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Cryptography: Secret Coding, Spying, and E-Commerce - Video [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Cryptography - Video [Last Updated On: February 9th, 2014] [Originally Added On: February 9th, 2014]
- Public Key Cryptography: RSA Encryption Algorithm - Video [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- Is Bitcoin Anonymous? Arvind Narayanan | Princeton University | Real World Cryptography Workshop - Video [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- A Competitive Study of Cryptography Techniques over Block Cipher - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- How Quantum Computing Will Change Cryptography [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- REALITY LOST - EXCERPT SIX (QUANTUM CRYPTOGRAPHY) - Video [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- Introduction to Cryptography of Bitcoin, Explained! - Video [Last Updated On: February 18th, 2014] [Originally Added On: February 18th, 2014]
- [FOSDEM 2014] USE OTR or how we learned to start worrying and love cryptography - Video [Last Updated On: February 18th, 2014] [Originally Added On: February 18th, 2014]
- Reshif's Cryptography Challenge Solution/Walkthrough - Video [Last Updated On: February 20th, 2014] [Originally Added On: February 20th, 2014]
- [DEFCON 19] Steganography and Cryptography 101 - Video [Last Updated On: February 22nd, 2014] [Originally Added On: February 22nd, 2014]
- A Brief Rundown Of The Spying Questions Intel's CEO Won't Answer [Last Updated On: February 25th, 2014] [Originally Added On: February 25th, 2014]
- DEF CON 8 - Jon Erickson - Number Theory Complexity, Theory, Cryptography, and Quantum Computing. - Video [Last Updated On: February 26th, 2014] [Originally Added On: February 26th, 2014]
- Was YOUR iPhone at risk of being hacked? Bug in Apple update left mobiles open to identity theft for up to 18 months ... [Last Updated On: February 27th, 2014] [Originally Added On: February 27th, 2014]
- Security researchers urge tech companies to explain their cryptographic choices [Last Updated On: February 27th, 2014] [Originally Added On: February 27th, 2014]
- Apple reveals algorithm behind 'encrypted' iMessages [Last Updated On: February 28th, 2014] [Originally Added On: February 28th, 2014]
- Wiliest Ways to Keep the NSA at Bay [Last Updated On: March 1st, 2014] [Originally Added On: March 1st, 2014]
- How to Pronounce Cryptography - Video [Last Updated On: March 1st, 2014] [Originally Added On: March 1st, 2014]
- cryptography in DNS - Video [Last Updated On: March 3rd, 2014] [Originally Added On: March 3rd, 2014]
- Who is the reclusive billionaire creator of Bitcoin? [Last Updated On: March 4th, 2014] [Originally Added On: March 4th, 2014]
- How to say cryptography in Italian - Video [Last Updated On: March 4th, 2014] [Originally Added On: March 4th, 2014]
- Massive Linux security flaw dwarfs Appleās cryptography problems of just last week [Last Updated On: March 5th, 2014] [Originally Added On: March 5th, 2014]
- Security lessons from RSA [Last Updated On: March 5th, 2014] [Originally Added On: March 5th, 2014]
- Visual Cryptography - Video [Last Updated On: March 5th, 2014] [Originally Added On: March 5th, 2014]
- Classical Computing Embraces Quantum Ideas [Last Updated On: March 6th, 2014] [Originally Added On: March 6th, 2014]
- Quantum Cryptography Conquers Noise Problem [Last Updated On: March 6th, 2014] [Originally Added On: March 6th, 2014]
- REALITY LOST Bonus scene 4. Quantum cryptography Founding Fathers. - Video [Last Updated On: March 7th, 2014] [Originally Added On: March 7th, 2014]
- Quantum Cryptography: From Theory to Practice - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- Forcing Trust: Nonlocal Games and Untrusted-device Cryptography - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- TrustyCon 2014 - New Frontiers in Cryptography - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- REALITY LOST Bonus scene 3. Christian Kurtsiefer on hacking quantum cryptography. - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- Nerlens Noel Tweets Date for Potential NBA Debut [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- CISSP SG Cryptography - Video [Last Updated On: March 10th, 2014] [Originally Added On: March 10th, 2014]
- More secure communications thanks to quantum physics [Last Updated On: March 13th, 2014] [Originally Added On: March 13th, 2014]
- New Cryptography Scheme Secured By Quantum Physics [Last Updated On: March 13th, 2014] [Originally Added On: March 13th, 2014]
- History Of Cryptography - Video [Last Updated On: March 14th, 2014] [Originally Added On: March 14th, 2014]
- avc 19 Cryptography x264 - Video [Last Updated On: March 15th, 2014] [Originally Added On: March 15th, 2014]
- Edward Snowden Speaks at SXSW [Last Updated On: April 10th, 2017] [Originally Added On: March 15th, 2014]
- Tor is building an anonymous instant messenger [Last Updated On: April 10th, 2017] [Originally Added On: March 15th, 2014]
- learn cryptography learn the following pkcs refrences - Video [Last Updated On: March 16th, 2014] [Originally Added On: March 16th, 2014]
- [Lec-2][Part-2] Shift Cipher - Symmetric ciphers - Video [Last Updated On: March 16th, 2014] [Originally Added On: March 16th, 2014]