CRYPTO-FINANCIAL ASSETS IN A DLT-BASED MARKET ...

181
CRYPTO-FINANCIAL ASSETS IN A DLT-BASED MARKET INFRASTRUCTURE Legal Principles of Ownership and Obligation Amy Held LL.M Minor Thesis June 2019

Transcript of CRYPTO-FINANCIAL ASSETS IN A DLT-BASED MARKET ...

CRYPTO-FINANCIAL ASSETS IN A DLT-BASED MARKET INFRASTRUCTURE

Legal Principles of Ownership and Obligation

Amy Held

LL.M Minor Thesis

June 2019

i

Preface

To the loving memory of P, who always believed in me.

I would never have been able to complete this thesis on time without the support of three persons in particular: Isabel; and Cris and Basti. You each know I owe you an immeasurable debt and, moreover, how it was incurred! Thank you, from the bottom of my heart. Many thanks to Yannick for clarifying the programming aspects of the paper and preventing what might have been glaring technical errors. The usual caveats for any outstanding apply. Thank you to Andrew for his steady academic support; and to David for his overwhelmingly positive examiner’s report. The paper has been improved considerably with the benefit of their insights and comments. Special thanks to Matthias for his wise and pragmatic advice on revising the thesis for publication; and to my colleagues at the University of Bonn’s Institute of Private International Law and Comparative Law for their warm welcome and understanding of my repeated absence from lunch as I took up this thesis once more. Now that it’s done: alle Jläser huh!

As an English barrister who spent a memorable year in Melbourne to study the MLS Law Masters, this paper is based primarily on English law (including EU legislation) with supplementary references to Australian and Victorian law where available and appropriate. Given the pace at which new developments occur in the crypto sphere, both the law and commercial practices remain stated as reported and available to me on 30 May 2019.

Amy Held Bonn, February 2020

ii

TABLE OF CONTENTS

1. INTRODUCTION 2. FINANCIAL ASSETS 2.1. Definitions 2.2. Substance and Form: Financial Assets and Legal Property 2.2.1. Bearer Instruments and Certificates 2.2.2. Book-Entries and Intermediation 2.3. Summary 3. CODE 3.1. Bitcoin 3.2. Ethereum 3.3. Further Developments 3.3.1 JP Morgan’s Quorum 3.3.2. r3’s Corda 3.4. Summary 4. CRYPTO-FINANCIAL ASSETS AND A DLT-BASED MARKET INFRASTRUCTURE 4.1. Cryptographic Assets: The Basic Premise 4.1.1. Private Keys and Blockchains 4.1.1.1. Private Keys as Documentary Intangibles

4.1.1.2. Private Keys as Intellectual Property 4.1.1.3. Private Keys as ID Credentials 4.1.1.4. Other Possibilities

4.1.2. Exchanges 4.1.2.1. Coinbase

iii

4.1.2.2. Gemini 4.1.3 Summary 4.2. ICOs and Issuers 4.2.1 LuxDeco - Nivaura

4.2.2. Overstock - tØ 4.2.3. Summary 4.3. Intermezzo: The Role of the Financial Markets Infrastructure

4.3.1. The Role of a CSD

4.3.2. Settlement Finality 4.3.3. Double Issuance 4.3.4. Conflicts of Interest 4.3.5. Conclusions 4.4. Top-Tier Intermediaries

4.4.1 The ASX: CHESS 4.4.2. The ASX: the DLT Solution

4.4.3. Summary 4.5. Sub-Tier Intermediaries Inter Se 4.5.1. HQLAx - Deutsche Börse 4.5.2. Summary 5. CONCLUSIONS 5.1. The Primary Question 5.2. Cryptographic Financial Form 5.3. Final Conclusions

1

1. INTRODUCTION

Before a right or an interest can be admitted into the category of property, or of a right

affecting property, it must be definable, identifiable by third parties, capable in its nature of

assumption by third parties, and have some degree of permanence or stability.

Lord Wilberforce, in National Provincial Bank Ltd v Ainsworth1

Of all the wide and varied modern forms of economic value and wealth, financial assets have

the dubious honour of being least amenable to a consistent property law analysis. In the past

two centuries alone, formal developments in respect of such assets have required no fewer

than three distinct property law analyses and characterisations.

Taking negotiable bonds as an example, until very recently, such assets typically took

definitive bearer form as a physical piece of paper. As such, they were treated for many legal

purposes as tangible property: capable of being situate in a jurisdiction for the conflict of laws;

capable of being the subject of legal possession and, therefore, of possession-based legal

techniques. As a matter of English property law, investment securities in bearer or certificated

form were classified as choses in possession.

Following, however, a shift in the 1980s to an electronic system of securities ownership,

investment securities are now issued electronically in global form and ‘held’ by chains of

intermediaries on behalf of investors. Whereas ownership was once established by physical

possession of the relevant piece of paper, ownership now is established by reference to the

intermediaries’ electronic book entries of clients’ securities accounts. Given the intangible

nature of such electronic book entries and use of custodian entities, intermediated securities

are characterised under English law as interests arising under a trust.

The even more recent trend towards decentralised ledger technology (‘DLT’), on the other

hand, raises wholly different considerations. Ownership of ‘crypto’ assets is, in practice,

typically established by knowledge and use of a cryptographic private key – essentially a large

and unique number – which can be ‘stored’ either digitally online or physically on paper, USB,

or computer hard drive. This is supplemented by consensus as to the quantum of value

1 [1965] AC 1175 (HL), 1247-8.

2

ascribed to this unique number by means of a decentralised blockchain. In the absence of

binding authority or statute, it will be demonstrated that crypto assets are open to a wide

variety of legal property analyses, depending on the approach taken in substantive analysis.

Such changes in form and legal analysis would not be problematic for financial assets as a

subject of legal property but for one significant issue: the nature and strength of the property

rights which necessarily follow from legal characterisation. A negotiable bond in commercial

terms may represent the same obligation of a debtor to pay, yet a creditor’s property rights in

such an obligation is protected from misappropriation by third parties either in conversion or

breach of trust, depending on whether that bond exists in bearer or intermediated form.

Similarly, a bailee and trustee may offer in practical terms the same custodial services over

the same financial assets yet, as a matter of law, bailments - possible only for bearer

instruments - and trusts - which are the only option if the asset takes intermediated form -

draw mutually exclusive conclusions regarding the location of legal title. These differences

have been shown to have knock-on effects on basic incidents of ownership.

Given such wide-ranging differences in the legal strength of property rights, the immediate

question becomes: why is there no consistent property characterisation for investment assets?

Does the problem lie with financial assets per se as the subject of legal property, or is there a

lacuna in English law? Relevant factors arise from consideration of both questions, however,

this paper will consider the issue predominantly from the perspective of the former and analyse

the formal factors inherent in modern financial assets which give rise to changes in legal

characterisation. More specifically, it will focus on the contemporary innovations in DLT, as

adopted at three levels of the financial markets infrastructure, to analyse how the shift from

book-entry to cryptographic financial form will have implications for legal principles of

ownership.

Chapter 2 will define the scope of the paper and set out the commercial and legal history of

financial assets prior to the invention of Bitcoin in 2009. Chapter 3 will give some technical

background to DLT. Chapter 4 will analyse specific applications of DLT by reference to case

studies at four levels of the modern financial markets infrastructure. Chapter 5 will offer

broader conclusions.

3

2. FINANCIAL ASSETS

Financial law is beautiful as well as useful, and the greatest expression of English

imagination since Shakespeare. We are not as proud of it as we ought to be.

Joanna Benjamin1

2.1 Definitions2

It is useful to begin with the proposition that all financial assets are, in legal terms, substantively

rights against other parties to enforce payment obligations. The paradigm example, from

which all financial assets derive, is the simple debt: an obligation imposed by law on one party

to pay a certain sum of money to another. The commercial transaction giving rise to the

obligation is mostly irrelevant, but the most obvious example is the purchase price which

becomes payable on a sale of goods. The creditor’s right of legal action to enforce payment

obligations has a long history in English law, beginning with the ancient writ of Debt which

appeared in standardised form by the late 1100s.3

‘Financial’ debts may be commercially distinguished as a sub-category defined by the

transaction giving rise to the obligation. Typically, these are not an obligation simply to pay a

sum of money but specifically to re-pay a certain sum of money, usually with some other

economic asset (interest) as the ‘price’ or security for use of the sum. In financial terms, such

an arrangement is generally known as a loan. As a matter of legal analysis, loans are financial

transactions which remain squarely within the realm of contract and obligations: a bilateral

agreement between two known parties who, as a matter of English law, are bound by privity

of contract.

1 J Benjamin, Financial Law (OUP 2007), [25]. 2 This section draws upon a past paper but does not cite directly from it, ‘Privity of Contract and Contract Theory,’ (LL.B Dissertation, University of London 2015). 3 AWB Simpson’s translation of Glanville’s writ in Latin, dating from the late 1180s: “The King to the Sheriff, greeting. Command N to render to R, justly and without delay, one hundred marks, which he owes him, and which, he complains, he is unjustly withholding from him. And if he does not do so, summon him by good summoners to be before me or my justices at Westminster …to show why he has not done so” in AWB Simpson, A History of the Common Law of Contract: The Rise of the Action of Assumpsit (Clarendon Press, Oxford 1975 (1987 printing)), 54.

4

Historically, the common law strictly prohibited substitutions to the parties to such agreements,

notwithstanding the practical advantages which flow from freely assigning contractual rights.

Consider the tripartite practice of assigning a debt which so troubled the common law judges

from the 15th century.4 Typically, Debtor will owe a debt to Creditor 1, who himself is indebted

to Creditor 2. Creditor 1 assigns his entitlement against Debtor to Creditor 2, thereby

discharging the debt that Creditor 1 owes to Creditor 2 and substituting Creditor 2 as the party

entitled to payment by the Debtor. Orthodox debt theory at common law, however, did not

recognise such practices, and instead maintained that the “debt cannot be maintained without

privitie.”5 Under this doctrine, the rights of a creditor were considered personal against his

debtor, and the credit comprising the right to receive payment from the debtor could not be

unilaterally transferred to someone other than his creditor. A promise to guarantee the

payment of a debt did not make that promisor a debtor; nor would a factual payment from the

guarantor discharge the debtor’s legal obligation to his creditor. This remained dependent on

the creditor’s subsequent forbearance on his legal right; there was technically nothing

preventing him from insisting on this to obtain double payment.6 Although the modern law

has moved on from the historic strict common law position,7 contemporary commercial loans

demonstrate this continued basis in contract, with formal procedures for substituting the

parties to the contract, or the identities of those entitled under the contract, such as assignment

and novation.

In this regard, loans are distinguished from debentures or bonds which, although are also

based on an obligation to re-pay with interest, are not constrained by the doctrines of orthodox

debt theory. Instead, they are positively intended to be freely transferrable and negotiable,

and boast a different legal lineage: deriving not from the English writ of Debt and developing

4 YB (1433) 11 Hen VI, 43 (30); Bourne v Mason (1669) 2 Keb 454, 457, 527; 1 Vent. 6; 86 ER 5; Clypsam v Morris (1667) 2 Keb 443; 84 ER 278. See generally VV Palmer, The Paths to Privity: The History of Third Party Beneficiary Contracts at English Law (Austin & Winfield, 1992), 68-72. 5 YB (1490) 5 Henry VII, 12, p1.18, in Palmer (n 4) 17. 6 Keble’s report to Bourne v Mason (1669) 2 Keb 454, at 527-428; 86 ER 5, highlighted the problem per curiam: the action lieth not by the plaintiff in regard the defendant promise to discharge the plaintiff, and he is a stranger to the plaintiff, the promise being made to one Parry ... he to whom the promise was made must bring the action, and the plaintiff hath still remedy him (his original debtor). But adjournatur.” See more generally Palmer (n 4). 7 It was only in the mid-19th century with the fusion of the administration of law and equity that choses in actions were recognised as being capable of being assigned; section 25(6) of the Judicature Act 1873, now s 136 of the Law of Property Act 1925 (UK) and s 134 of the Property Law Act 1958 (Vic) prescribed a statutory method of assigning debts, however, enforcement of a contractual obligation by a third party in England and Wales would not be possible until the Contracts (Rights of Third Parties) Act 1999 (UK).

5

through assumpsit into the common law of contract, 8 but from the merchant banking

instruments which developed in the 12th century as a means of financing international trade

at the medieval continental fairs.9 One particular innovation which emerged in 13th century

Italian banking practice recognised the free transferability and negotiability of payment

obligations represented by certain financial instruments. These were the early prototypes of

modern bills of exchange.10

Although such financial instruments could be enforced in England through the specialised law

merchant courts by the 15th century,11 such customs were not recognised at common law until

the 17th century when the common law judges began to incorporate law merchant into the

common law12 as traditional feudal socio-economics based on land increasingly gave way to

the modern credit-based economy. By the very early 18th century, both bills of exchange and

promissory notes were recognised at law as, not merely transferrable from one person to

another, but also fully negotiable in the technical sense: capable of passing from a transferor

to a good faith purchaser for value without notice,13 free from prior equities or defects in the

title of the transferor if the instrument were negotiated prior to maturity.14 Special treatment

was accorded to the promissory notes of the Bank of England: recognised as ‘money’ in 175815

before being declared legal tender by s 6 of the Bank of England Act 1833.

Transferability is consistently emphasised as the defining characteristic of property in the

common law authorities,16 and although its significance has been challenged by theorists,17

this paper adopts the position that free transferability and full negotiability without legal

formality are essential to whether financial obligations can be properly considered a subject of

8 See generally Simpson (n 3); AWB Simpson, ‘Innovation in Nineteenth Century Contract Law,’ in Legal Theory and Legal History: Essays on the Common Law (1987, The Hambledon Press). 9 F Braudel (trans S Reynolds), Civilisation and Capitalism 15th-18 Century Vol II: The Wheels of Commerce (1983, Book Club Associates by arrangement with William Collins Sons & Co), 81 et seq, particularly 90 et seq for the instruments of finance. 10 PS Atiyah, The Rise and Fall of Freedom of Contract (Clarendon Press 1979 (1986 printing)), 137. 11 Ibid. 12 Woodward v Row (1666) 2 Keb 132, 84 ER 84; Williams v Williams (1683) Carth. 269, 90 ER 759. 13 Bills of Exchange Act 1882 s 29(1). 14 Brown v Davies (1789) 3 Term Rep 80; 100 ER 466. 15 Miller v Race (1758) 1 Burr 452, 97 ER 398. 16 M Bridge et al (eds) The Law of Personal Property (2nd ed, Sweet and Maxwell, 2018), [1-003], fn 10. 17 Bridge et al (n 16), [1-003], fn 11.

6

legal property. 18 For this reason, this paper considers loans and other strictly bilateral

agreements rooted in the common law of contract as a limited type of ‘financial asset’ insofar

as the incident of alienability is considered definitive. As has been written:

Debt securities by their nature, are transferable (subject to any transfer restrictions under

applicable securities laws). Loan agreements usually allow the banks to transfer their

interests to other banks (either by assignment or by execution of a novation certificate)

or to achieve a similar commercial effect (by sub-participation). In practice, however,

there is less secondary trading in loans (other than in the 'distressed' debt market) when

compared to debt securities, for which transferability is an important factor in attracting

investors.19

This paper will not, therefore, explore loan transactions at length, save as to provide clarity by

way of comparison. Rather, financial assets thus defined for the purposes of this paper can

be, in most cases, very conveniently identified as those which are freely traded on an

exchange. 20 The most recognisable such assets are those associated with corporate

fundraising, which have been defined by various legislation and regulations. In the European

Union, Art 4(44) of the Markets in Financial Instruments Directive (‘MIFID’) defines

’transferable securities’ as:

…those classes of securities which are negotiable on the capital market, with the

exception of instruments of payment, such as (a) shares in companies, depositary

receipts in respect of shares; (b) bonds or other forms of securitised debt,

depositary receipts in respect of such securities; and (3) any other securities giving

the right to acquire any of the above or giving rise to a cash settlement determined

by reference to transferable securities, currencies, interest rates, yields,

commodities or other indices or measures.21

18 Professors Bridge et al (n 16) also adopt this position, stating at [1-003] that “transmissibility is a general incident of property in English law. Alienability or transferability is the default position. Inalienability is exceptional. Ultimately all assets or wealth are transferable, if only upon death or bankruptcy.” At [1-057], they suggest that “the three features of transferability, excludability, and exigibility provide useful benchmarks for testing whether new forms of wealth or other assets give rise to property rights.” 19 G Fuller, The Law and Practice of International Capital Markets (3rd ed, 2012, LexisNexis), [1.44] 20 Fuller (n 19), [1.14]. Emphases added. 21 Financial Services and Markets Act 2000 s 102A(3); Directive 2014/65/EU of the European Parliament and of the Council of 15 May 2014 on markets in financial instruments and amending Directive 2002/92/EC and Directive 2011/61/EU [2014] OJ L 173/349 (MiFID) Art 4(44).

7

Another definition for securities under the US Federal Securities Act 1933:

Any note, stock, treasury stock, security future, security-based swap, bond,

debenture, evidence of indebtedness, certificate of interest or participation in any

profit sharing agreement, collateral-trust certificate, preorganization certificate or

subscription, transferable share, investment contract, voting-trust certificate,

certificate of deposit for a security, fractional undivided interest in oil, gas or other

mineral rights, any put, call, straddle, option, or privilege on any security, certificate

of deposit, or group or index of securities (including any interest therein or based

on the value thereof), or any put, call, straddle, option, or privilege entered into on

a national securities exchange relating to foreign currency, or, in general, any

interest or instrument commonly known as a "security", or any certificate of interest

or participation in, temporary or interim certificate for, receipt for, guarantee of, or

warrant or right to subscribe to or purchase, any of the foregoing.22

For current purposes, the more general definition as bearer company shares and debentures

will suffice, as the emphasis here is not the commercial features of the instrument, but the

legal analysis which, it is submitted, yields two key characteristics: (i) an underlying obligation

by one party, (usually a company) to repay funds (typically with some added economic value,

such as interest, dividends, returns, or voting rights); but (ii) are, as a matter of property law,

fully negotiable and transferrable from one creditor to another without legal formality.23 In

accordance with the nomenclature used in modern financial regulation and legislation, this

paper will refer to such assets as ‘securities’24 and interchangeably with ‘financial assets.’

For the sake of completeness, is worth noting that, although this paper clearly distinguishes

between (1) financial obligations that are typically inalienable, such as loans; and (2) financial

22 Securities Act 1933 s 2(a)(1), 15 USCA § 78a (2012). 23 In many US jurisdictions, share certificates are still regarded as bearer negotiable instruments transferrable by simple delivery. In England and Wales and in Australia, however, Longman v Bath Electric Tramways, Limited [1905] 1 Ch 646 remains good law; in these jurisdictions, therefore, and share certificates merely evidence entry of the holder’s name in the company’s definitive register of members. In addition, also excluded here are any formalities which may be imposed under the terms of the investment or the company’s constitutional documents, e.g., lock up on withdrawing capital from a private investment fund or permission from a company to transfer shares or the need to register the share transfer on the register of the company. These are formalities imposed under contract, and not the nature of the asset. 24 See Fuller (n 19), [1.10]-[1.14] for the development of the term.

8

obligations that are freely transferrable on an exchange, such as securities, these are not two

mutually exclusive categories exhaustive of the vast range of financial agreements used in

modern commercial practice. For example, “chattel paper” is a concept derived from US law

and is defined in s 10 of the Australian Personal Property Securities Act 2009 as:

…one or more writings that evidence a monetary obligation and either or both of the

following:

(a) a security interest in, or lease of, specific goods, or specific goods and

accessions to the specific goods (even if the description of the goods (and

accessions) is taken to include a description of intellectual property, or an

intellectual property licence, under section 105);

(b) a security interest in specific intellectual property or a specific intellectual

property licence;

but does not include any of the following:

(c) a document of title;

(d) an intermediated security;

(e) an investment instrument; (f) a negotiable instrument.

As such, chattel paper does not, strictly, fall to be classified either as a bilateral loan or financial

asset traded on an exchange. This is so, notwithstanding that, in early US commercial

practice, chattel paper received similar treatment in law as negotiable instruments, even if they

did not meet all the technical requirements of negotiability.25 Given, however, the present

emphasis on transferability as an incident of legal property and ownership, rather than on

financial law and practice, financial obligations that lie between the poles of loan and security

will not be considered in depth.

25 JK Winn, ‘Electronic Chattel Paper: Invitation Accepted,’ (25 September 2010), 5. Available at < https://ssrn.com/abstract=1682783 > or < http://dx.doi.org/10.2139/ssrn.1682783 > accessed 30 January 2020.

9

2.2. Substance and Form: Financial Assets as Legal Property

Unlike other types of economic wealth, financial assets have not enjoyed any consistent

definition as a subject of English property law. To some extent, this may well be attributable

to the peculiarities of English property law itself, shaped, as it is, by the common law’s

centuries-old preoccupation with real estates which, until the advent of capitalism in the 18th

century, remained at the heart of social and economic life. Reflecting this importance,

historically, the English property law taxonomy properly consisted only of real property, that

is, those subject to the real actions and thereby recoverable in rem. In practical terms, this

essentially meant interests in land. The personal actions – Debt, Detinue, Trover, and

Conversion – could be used to enforce obligations or for damage suffered to goods, but gave

rise to compensatory relief only, not recovery of the thing itself.26 These ‘things’, though

undoubtedly possessing economic value, were not formally recognised as a category in

English property law until Blackstone in 18th century, albeit, a residual one for anything of

economic value which was not an interest in land. Blackstone’s familiar sub-categories27

within personal property - ‘choses in possession’ and ‘choses in action’ - remain in general

use today; however, their continued relevance and usefulness are increasingly the subject of

specialist scholarly debate.28

On the other hand, financial assets are, in themselves, conceptually difficult. Based,

essentially, on moral notions 29 of promise, obligation, and duty, financial assets are, in

substance, abstract concepts. However, given the social significance of such obligations and

the increasingly impersonal and commercial nature of trade, there has been increasing

recourse to some kind of tangible representation to symbolise the obligation. It is the specific

features of such symbolic representation that is presently defined as financial ‘form.’

As will be demonstrated, the form used to represent financial promises intended to be binding

– and enforced by the law if necessary – has varied over time. Legally, a financial asset is

26 F Maitland, Equity and The Forms of Action: Two Courses of Lectures, ed. A.H. Chaytor and W.J. Whittaker (1910, CUP), 65; 71. 27 Bl Comm II 389. 28 Bridge et al (n 16), [1-018]; [1-020]; [1-021]; Financial Markets Law Committee, ‘Issues of Legal Uncertainty Arising in the Context of Virtual Currencies’ (July 2016) < www.fmlc.org > accessed 18 June 2018. 29 See David Graeber, Debt: the First 5000 Years (Melville House 2011) for a fascinating anthropological account of debt as a fundamental moral and social construct, as opposed to the capitalist and commercial associations of orthodox economic theory.

10

nothing but an abstract concept of obligation, which allows for flexibility. Unlike other social

constructs giving form to obligations or promises undertaken - such as a wedding ring or

clerical collar - there is no prescribed form which must be or is customarily used to symbolise

financial obligations. Financial form for indebtedness can, therefore, be whatever is

convenient. On the other hand, it is submitted that this flexibility, more than any other factor,

is the reason for the unique problems faced by financial assets as the subject of a legal

property analysis. These can be demonstrated by an examination of the evolution of financial

forms between the mid-20th and early 21st centuries.

2.2.1. Bearer Instruments and Certificates

Paper records have long been the preferred method in law of reifying abstract obligations such

as promises, as is plainly demonstrated by the promissory notes issued by the Bank of

England bearing the words: “I promise to pay the bearer on demand the sum of x pounds.”

Cash banknotes remain arguably the most everyday example of financial obligations as a kind

of transferrable and negotiable property and, conceptually, financial assets issued and traded

on the capital markets in bearer form are no different. Consider the Autostrade eurobond,

issued in 1963; the commercial transaction from which the birth of the modern international

capital markets can be traced. Although the commercial features of the issue - essentially,

the specifics of what exactly was promised and how and where - were certainly revolutionary,30

the legal obligations owed by Autostrade to its investors still took traditional form as a bearer

bond. 31 Like cash banknotes, possession of the paper instrument was still definitive of

entitlement to performance of the obligation (that is, to establish ‘ownership’): payments were

made against physical presentation of the paper coupons or bond itself at the offices of the

issuer’s paying agent, with no other proof of ownership required in either case.32 Hence, the

form known today as the ‘definitive bearer security:’ a piece of paper printed with security

features to a similar standard as a banknote. These were typically (but not always) negotiable

instruments.33

30 I.e., a bond denominated in US dollars and issued by an Italian company, and moreover, arranged and documented by City of London bankers and lawyers, and listed on various international exchanges. For details on the Autostrade issue, see further Fuller (n 19), [2.49] – [2.51]. 31 Fuller (n 19), [2.49]. 32 Fuller (n 19), [2.58]. 33 Fuller (n 19), [1.113]-[1.115].

11

As freely transferrable and negotiable pieces of paper representing indebtedness gained ever

increasing significance in economic and social life though the latter half of the 20th century, a

new perspective in property law developed to accommodate such instruments. Professor

Goode has notably proposed a new property law taxonomy, whereby the old category of

‘choses in action’ or ‘intangibles’ is sub-divided into pure and documentary intangibles.34 Key

to such distinction is the use of paper documents. ‘Pure’ intangibles are defined as “a right

which is not in law considered to be represented by a document.”35 By contrast, ‘documentary

intangibles are those in which “the debt or other obligation is considered in law, in recognition

of mercantile usage,36 to be locked up in the document.”37 Professor Goode identifies three

types of documentary intangible: (i) documents of title to payments of money (termed

instruments); (ii) documents of title to negotiable securities (e.g., bearer bonds and notes),

and documents of title to goods (such as bills of lading).38

Professor Bridge et al summarise the consequences that are said to flow from symbolising a

legal promise in this kind of paper form in three main points.39 First, delivery of the document

will usually be effective to transfer the ownership of the asset, that is, the benefit of the

promise, to the transferee. Second, the remedies for wrongful interference with goods, such

as conversion, are extended by a ‘benevolent fiction’ to apply to documentary intangibles, or

any commercial document evidencing an obligation or a debt. The measure of damages in

such cases is not the value of the paper itself - worthless per se - but the value of the

entitlement.40 Although not all commercial documents recording an entitlement or obligation

are regarded as documentary intangibles for all purposes, it is noted that tort of conversion

has been extended to misappropriation of share certificates.41 Third, possession-based legal

techniques, such as bailment and pledge, are available in respect of such assets.42

34 E McKendrick (ed), Goode on Commercial Law, 5th ed (2016), [2.53] et seq. 35 McKendrick (n 34), [2.54]. 36 McKendrick (n 34), [2.58]. 37 McKendrick (n 34), [2.56]. 38 McKendrick (n 34), [2.56]. 39 Bridge et al (n 16), [1-022]. 40 International Factors Ltd v Rodriguez [1979] QB 351; BBMB Finance (Hong Kong) Ltd v Eda Holdings Ltd [1990] 1 WLR 409 (PC); OBG v Allan [2007] UKHL 21, [2008] 1 AC 1 in Bridge et al (n 16), [1-022] fn 92. 41 BBMB Finance (Hong Kong) ltd v Eda Holdings Ltd [1990] 1 WLR 409 (PC) in Bridge et al (n 16), [1-022] fn 95. 42 S Dromgoole and Y Baatz, ‘The Bill of Lading as a Document of Title,’ in N Palmer and E McKendrick E (eds), Interests in Goods (2nd ed, 1998), in Bridge et al (n 16), [1-022] fn 93.

12

2.2.2. Book-Entries and Intermediation: The Modern Financial Markets Infrastructure43 Although Professor Goode’s distinction between pure and documentary intangibles is

conceptually useful, it is respectfully submitted that its reliance on the existence of a paper

document renders its practical use - at least in the financial sector - somewhat outdated. In

response to the steady increase in the volume of trading since the Autostrade issue in 1963,

the capital markets have experienced significant changes in the way which financial assets

are held and traded.

First, a formal shift away from paper instruments to electronic book entries. Given the reliance

on definitive paper documents, the growth of the capital markets precipitated a parallel ‘paper

crisis’ as the volume of transactions increased. The costs of printing valuable securities

vulnerable to theft or fraud also became an increasing concern. Hence, a new method of

holding securities was established by the first Eurobond clearing systems in the late 1960s,44

which was designed to eliminate these issues by storing bearer securities in safe custody; the

clearing house performing administrative tasks, such as presenting coupons and bonds for

payment on behalf of the investor, remitting the proceeds to the investor’s accounts, and

recording transfers between market participants. Further innovations include the ‘temporary

global bond’ pioneered in 1973; a single bond representing an entire issue and held by the

clearing system until definitive bearer bonds were printed some months after the closing of

the issue.45

The benefits of such systems soon attracted wider interest. By 1989, the Group of Thirty

(‘G30’) recommended that all countries establish a central securities depository (‘CSD’) to hold

securities within their domestic markets.46

43 Approximately 1,500 words (on global custody and intermediation) was taken from a past paper ‘Intermediation, Custody, and the Law of Trusts: Did English Law Cope with the Lehman Insolvency?’ (LL.M Research Paper, Commercial Law: Issues and Policies, Melbourne Law School, December 2017). 44 Euroclear was established 1968, closely followed by Cedel (now Clearstream) in 1971: see Fuller (n 19), [2.58]. 45 Fuller (n 19), [2.59]. 46 Group of Thirty, ‘Clearance and Settlement in the World’s Securities Markets’ (1989), Recommendation 3, p 7; pp 51-55. The ‘most important’ feature of such a central depository was held to be the efficient and low risk transaction settlement of securities in book-entry form.

13

Two techniques to achieve this end were recognised. ‘Immobilisation’ of securities was

defined as:

…storage of securities certificates in a vault in order to eliminate physical

movement of certificates/documents on transfer of ownership.47

‘Dematerialisation,’ on the other hand, takes the concept further:

…elimination of physical certificates or documents of title which represent

ownership of securities so that securities exist only as computer records.48

Today, the usual practice is for bonds to be issued in permanent global form, to be held by an

international clearing system49 on an immobilised or dematerialised basis50 for the entire term.

Definitive documents are only issued in certain defined circumstances, upon which they

become mandatory. These refer to exceptional events, such as a continuing default under

the terms of the issue, or the on-going closure of the main international central securities

depositories (‘ICSD’), such as Euroclear Bank and Clearstream Banking SA.51 In most cases,

however, the economic owner of a financial asset will never receive any piece of paper

reflecting their entitlement against the issuer. Instead, ownership is determined largely, if not

solely,52 by reference to the transfers recorded in the electronic book-entries of the settlement

system.53 Even in the case of global bearer securities, which require payments made to be

recorded in a schedule to the security, it is widely believed that most common depositories do

47 Group of Thirty (n 46), 83. 48 Group of Thirty (n 46), 82. 49 Fuller (n 19), [1.119]. 50 Until relatively recently, both Euroclear and Clearstream operated on an immobilised basis under the ‘Classic Global Note’ structure; the New Global Note structure introduced in 2006 for bearer global notes issued on a partially dematerialised bass. From 2010, the ‘New Safekeeping Structure’ has been used for registered global securities. See further Fuller (n 19), [1.131]-[1.135]. 51 Fuller (n 19), [1.120]. More unusually, it may be possible to exchange the global security for definitives at the option of the issuer or investors, Ibid [1.1.21]. See also Secure Capital SA v Credit Suisse AG [2017] EWCA Civ 1486, [11]. 52 Such is the position under registered securities, where the title register is definitive of legal ownership. 53 M Yates and G Montagu, The Law of Global Custody: Legal Risk Management in Securities Investment and Collateral (4th ed, Bloomsbury 2013), [2.6]: “When participant 1 wishes to transfer assets to participant 2, both participants send matching electronic instructions to the settlement system. Provided sufficient assets are available in the relevant accounts, the settlement system then debits the account of participant 1 and credits that of participant 2.”

14

not, in practice, retrieve the security from its vaults and physically record each transfer.

Instead, they typically rely on their own internal records to establish ownership.54

Book-entry form thus precipitates the second major change to financial assets: ownership and

trading through a complex network of third-party intermediaries, which is collectively known

as the financial markets infrastructure. This is necessitated by immobilisation and

dematerialisation, both relying on the use of a CSD which stands between the contractual

parties, that is, the debtor-issuer and creditor-investor. Given the pace at which the identity of

the creditor-investor changes through trading of the debtor-issuer’s promise to re-pay on the

secondary markets, the function of the CSD, at least from a property law perspective,

essentially is to keep track of who, at any given time, is entitled to the performance of the

debtor-issuer’s obligation to repay principal and pay interest.

Although this may sufficiently encapsulate the principle for theoretical purposes, in practice,

CSDs comprise only the first layer of intermediaries which stand between the contractual

parties. Much like the way in which a central bank does not concern itself with the identities of

every individual who participates in the central banking system, modern CSDs do not establish

ownership records by identifying individual creditor-investors. Access to CSDs is typically

limited to custodian entities and other large financial institutions providing custodial services,

which then typically maintain securities accounts for sub-custodians, in a chain of sub-

accounts ending with the individual investor.

In line with the shifts to issuing securities in immobilised and dematerialised form, custodians

have adopted new methods of thus ‘holding’ securities in custody. Traditionally, assets

deposited with a custodian for safekeeping took effect as a bailment for reward.55 A bailee-

custodian gained the legal interest of possession, and the bailor-investor retained his legal

title throughout the term of bailment.56 Bailment, thus, offers similar insolvency protections to

those associated with the trust. Today, however, custodians have largely dispensed with

physical vaults and hold securities in electronic accounts. Unless specific segregation is

requested (and paid for), it is customary for custodians to commingle the like assets of different

54 Fuller (n 19), [1.132] fn 2. 55 AW Beaves, ‘Global Custody – A Tentative Analysis of Property and Contract’ in N Palmer and E McKendrick (eds) Interests in Goods (2nd ed, LLP 1998) 20 fn 17 and text. The classification derives from the classic statement in Coggs v Barnard (1703) 2 Raym 909, 912-13; 92 ER 107, 109. 56 Re Ware, Ex p Drake (1877) 5 Ch D 866, in NE Palmer, Palmer on Bailment (3rd ed, Sweet and Maxwell 2009), [30-031] fn 115 and text.

15

custody clients in a single, electronic pool.57 One significant contemporary legal issue arising

in this context is that, absent any requirement that the custodian maintains the account so that

it reflects the aggregate of client entitlements in the custodian’s records, the pool is subject to

the risk of shortfalls. These may arise through relatively simple administrative failures, the

commercial practices of the custodian itself, 58 or, of course, deliberate fraud. Where,

therefore, client-specific segregation is not offered, the allocation of losses between clients in

the case of shortfall remains an outstanding issue.

Book-entry form and intermediation, thus, can be defined by two key characteristics: (i)

financial assets take form as book-entries on an electronic ledger which is created by records

of trades by a settlement system; (ii) financial assets are indirectly owned through a chain of

intermediaries. Two significant legal consequences subsequently follow.

First, financial assets are no longer ‘documentary,’ in the sense of being documented on paper

following Professor Goode’s definition and, although there have been attempts to extrapolate

the legal analysis applicable to documentary intangibles to electronic records, these have

been adopted only in a limited way in practice.59 Rather, given that records of ownership are

documented electronically on the custodians’ settlement systems as records of trades and

settlement, the general position is that intermediated securities are intangibles which can no

longer benefit from the ‘benevolent fiction’ of being treated as a chose in possession. Unlike

financial assets in the form of bearer instruments, the orthodox position is that intermediated

form is generally thought to render financial assets incapable of being the subject of legal

57 Yates and Montagu (n 53), [2.39]. 58 Yates and Montagu (n 53), [3.54], e.g., contractual settlement, whereby a custodian extends credit to a client by settling trades as settlement falls due; notwithstanding that a client might not at that time hold sufficient cash or securities in their account. 59 The UNCITRAL Model Law on Electronic Transferrable Records (2017) provides for the domestic and cross-border legal use of “electronic transferable records,” which are electronic records functionally equivalent to bearer transferrable paper documents - such as bills of lading, bills of exchange, promissory notes, warehouse receipts - that confer ownership by possession. Control is adopted as the functional equivalent of possession and may be established if a reliable method is used to: (a) establish exclusive control of that electronic transferable record by a person; and (b) identify that person as the person in control. The Model Law is expressly intended to be technologically neutral, and the UNCITRAL itself states that it may accommodate tokens and distributed ledgers. As at the time of writing, however, the Model Law, has only be adopted in one State. Similarly, the concept of “electronic chattel paper” was first introduced by an amendment to Article 9 of the US Uniform Commercial Code in 1999, but was not widely adopted in practice. It appears that this was, at least in part, attributable to the high technological threshold for showing control of ECP; new amendments finalised in 2010 lower that threshold and it is expected that this should further encourage increased use of ECP. See further Winn (n 25).

16

possession and possession-based legal techniques, 60 such as bailment 61 and lien. 62

Although Article 8 of the US Uniform Commercial Code does make provision for

dematerialisation or immobilisation of investment securities – including for claims in

traditionally possession-based actions, such as conversion, replevin, and lien – such

provisions were not enacted to create a legal property interest analogous to a piece of paper,

capable of being within the control and possession of one person. Rather, they provide

practical substantive solutions for problems, such as fraud, shortfalls, and the good faith

purchaser for value without notice, that arise from intermediation and electronic book-entry

form.

Second, intermediaries such as CSDs and custodians have become a necessary feature of

owning and trading in financial assets. Even if it were ‘possible or practicable’ for all investors

to gain direct participation in settlement systems,63 the Law Commission has noted that:

…as long as securities are immobilised in the form of a global certificate, investors

are obliged to hold securities indirectly, either through a central depository or

through an account holder of the depository.64

Until relatively recently, there was no direct English authority on the legal nature of the

relationships that underpin intermediation. The dominant view, however, tended to be that,

given that bailment was no longer possible, the ‘natural characterisation’65 of the contemporary

custody relationship is trustee-beneficiary: title to the global security held by, usually, the

common depository on trust for the next level of intermediaries (ICSDs or CSDs), which also

hold that interest for the next tier (account holders of those depositories), and so on through a

chain of further sub-trusts to the ultimate end investor. This trust characterisation was recently

confirmed in the recent litigation following the insolvent collapse of the Lehman Brothers

Group.66

60 Benjamin (n 1), [16.07]. 61 Yates and Montagu (n 53), [3.12]. 62 Re Lehman Brothers International (Europe) (Extended Liens) [2012] EWHC 2997 (Ch); [2014] 2 BCLC 295. 63 Yates and Montagu (n 53), [2.39]. 64 Law Commission, ‘Fiduciary Duties of Investment Intermediaries’ (Law Comm No 350, 2014), [11.108]. Emphasis added. 65 Yates and Montagu (n 53), [3.12]. 66 Re Lehman Brothers International (Europe), also known as Lomas v RAB Market Cycles (Master) Fund Ltd [2009] EWHC 2545 (Ch); Re Lehman Brothers International (Europe), also known as Pearson v Lehman Brothers Finance SA (RASCALS) [2010] EWHC 2914 (Ch).

17

Drawing both these strands together, book-entry financial assets are thus, under an English

property law analysis, characterised as an interest arising under at sub-trust. This

characterisation, however, is not without its critics, especially in respect of investors’ rights of

ownership in their financial assets. Gabriel Moss, for example, has argued that an ‘interest in

an interest’ under a trust does not accord with an investor’s ‘gut feeling’ of ownership.67

Further, Mr Moss draws attention to the fragility of rights under an English trust when

intermediaries are located in another jurisdiction.68

More significantly, however, as the owner of only a beneficial interest, investors lack legal

standing to sue upon default on the issuer’s obligations. In MCC Proceeds Inc v Lehman

Brothers International (Europe),69 legal title to shares had been transferred to a trustee as a

bare nominee for the transferor-beneficiary. In breach of trust, the nominee pledged the

shares to a third party which subsequently exercised its right of sale. The beneficiary was

held to have no standing to bring a claim for conversion and its claim was struck out as

disclosing no reasonable cause of action. The Court of Appeal upheld the decision and,

furthermore, by a majority of 2:1, the action was held to be an abuse of process. Although

some solace may be had in the practice of issuing definitive securities in exceptional

circumstances,70 this does not recognise that not all defaults on a financial asset are pecuniary

in character and arise only upon serious default of payment obligations. In Secure Capital

SA v Credit Suisse AG,71 an investor in a global bearer Note held by the Bank of New York

Mellon (as depository for Clearstream) wished to sue the issuer for misrepresentation. The

investor was held not to have standing to bring a claim, notwithstanding that the only person

entitled to do so (the depository) would not suffer any loss from the breach.72 Such a dilution

67 G Moss ‘Intermediated Securities: Issues Arising on Insolvency’ in L Gullifer and J Payne (eds) Intermediated Securities (Hart 2010) 65. For proponents of the trust analysis, see B McFarlane and R Stevens, ‘Interests in Securities: Practical Problems and Conceptual Solutions’ in L Gullifer and J Payne (eds) Intermediated Securities (Hart 2010). 68 Moss (n 67), 64. 69 [1998] 4 All ER (CA) 675; [1998] 2 BCLC 659. 70 Fn 51 and text at 13 above. 71 [2017] EWCA Civ 1486. 72 [2017] EWCA Civ 1486, [39]. Thus, the securities parallel to the problems in Alfred McAlpine Construction Ltd v Panatown Ltd [2001] 1 AC 518 and Beswick v Beswick [1967] UKHL 2.

18

in ownership rights has raised significant concerns amongst theorists73 and policymakers

alike.74

Other problems with a trustee-beneficiary characterisation of intermediation are the fiduciary

obligations imposed on trustees, traditionally ex officio without more. Although modern trust

practice, 75 legislation, 76 and common law authorities 77 recognise the validity of clauses

exempting trustees from strict fiduciary liability, there remains, contrary to common law

authority,78 a general ‘historical hangover’ of fiduciary ideals associated with the traditional

office of trustee. For example, the modern commercial practice of securities lending by prime

brokers, commercially a custodian entity often associated with hedge funds but in law

considered a trustee, has given rise to significant concern amongst the legal community:

To an industry-outsider, and lawyer, stock-lending by custodians seems little short

of scandalous. The idea that a custodian should be gambling the very assets which

are entrusted to its safekeeping, for its own private profit, must be outlawed unless

there are compelling reasons justifying its continuance, in which case the profit

should be, at the very least, shared.79

It is submitted that such concern is misplaced and arises solely from the legal characterisation

of book-entry financial assets as interests arising under a trust. From a macroeconomic

perspective, securities lending has been recognised by the G30 as a practice to be

73 J Benjamin, ‘Stewardship and Collateral,’ (LSE Law, Society and Economy Working Papers 7/2017 July 2017) < https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2969829 > accessed 29 October 2018; L Gullifer and J Payne (eds) Intermediated Securities (Hart 2010). Professors Benjamin and Dr Eva Micheler of the London School of Economics are particularly active in this field. 74 See generally, Financial Markets Law Committee, Proprietary Interests in Investment Securities’ (Issue 3, July 2004); Law Commission of England and Wales, ‘The UNIDOIT Convention on Substantive Rules Regarding Intermediated Securities: Further Updated Advice to HM Treasury’ (May 2008). 75 See generally Law Commission of England and Wales, ‘Trustee Exemption Clauses’ (Law Com No 301 Cmmd 6874, 2006). 76 The Companies Act 2006 s 750, which re-enacts Companies Act 1947 s 17(1), limits the liability of debenture trustees to the powers and duties contained in the trust deed. The provision was recommended by the 1945 Cohen Committee on Company Law Amendment (Cmmd 166). 77 Armitage v Nurse [1997] EWCA Civ 1279. 78 Bristol and West Building Society v Mothew [1996] EWCA Civ 533. 79 Commercial Bar Association and Bar Council of England and Wales, in Law Commission, Fiduciary Duties of Investment Intermediaries (Law Comm No 350, 2014), [11.86].

19

encouraged to facilitate effective settlement.80 From a commercial perspective, it is inaccurate

to say that the prime brokers with whom securities lending is associated are ‘entrusted’ with

the securities for ‘safekeeping.’ Contemporary global custody has evolved far beyond the

basic administrative duties customarily associated with administration of the international

portfolios of time-poor institutional investors, and now encompasses a range of enhanced

services as market participants compete to win new mandates.81 In the context of prime

brokers, far from the security deposited being a use-value investment acquired to be held until

maturity, hedge fund clients typically acquire securities to establish positions for derivative,

secondary market arbitrage purposes on an ‘acquire to trade’ basis; such acquisitions are

highly leveraged and funded by none other than the prime broker itself on the faith in the

client’s investment strategy.

80 The G30 expressly encouraged the practice as a “method of expediting the settlement of securities transactions” and recommended that “existing regulatory and taxation barriers that inhibit the practice of lending securities should be removed by 1990” in Group of Thirty (n 46), Recommendation 8 p16. The current aim for securities settlement is T+1. Other justifications include liquidity and preventing bubbles in the market. 81 Yates and Montagu (n 53), [1.10]-[1.12].

20

2.3. Summary

This section set out the relevant considerations for a property analysis of financial assets and

outlined the evolution of forms used to represent such assets since the launch of the modern

international capital markets. It demonstrated the extent to which the same substantive

economic asset, essentially a promise by an issuer-debtor to re-pay a sum of money with

additional economic benefits, gives rise to radically different property characterisations, often

with unintended consequences in law. It was submitted that such inconsistency arises from

the essentially abstract nature of the economic benefit as an obligation and the lack of any

prescribed form for the way in which such obligations are represented.

It is worth reflecting upon several points to bear in mind for the following sections, which will

consider cryptographic form to represent financial assets. First, the essential substance of a

financial asset is an abstract obligation, which may be represented in a wide range of forms.

Care should be taken not to conflate form with substance, or, even worse, allow legal analysis

to be misguided by what are essentially nothing more than secondary considerations of form.

Second, legal analysis should be alert to the nature of the obligations which arise as a

necessary consequence of adopting certain legal forms. Third, the legal structure of the

modern financial markets infrastructure, which has been set out in some depth, as the

background against which the contemporary debate on cryptographic financial assets and a

DLT-based settlement system is premised and conceptualised.

21

3. CODE, CRYPTOGRAPHY, AND DISTRIBUTED LEDGERS

Regardless of the particular analogies used to explain the technology, regulators will

continually look at how a token is employed, what work it helps a user accomplish, and they

will thus classify these activities as within or without their regulatory purview. The “how it is

employed” question will always be more significant to any regulatory policy than the abstract

and metaphysical “what is it” question. The unintended result, however, will necessarily be a

confounding cavalcade of seemingly contradictory conclusions

Peter van Valkenburgh1

‘Bitcoin’ and ‘blockchain’ are now two terms of which the general public will have at least

passing awareness, especially since the price of Bitcoin peaked on 11 December 2017 at

£13,133.28.2 First associated with fraud and trade on the dark web in the broader public

discourse, the potential of cryptographic assets and DLT to herald the ‘fourth industrial

revolution’3 is now widely recognised and continues to be explored in almost every sphere of

socio-economic life. 4 The increasing volume of formal research papers published by

institutional, political, and legal entities make clear that crypto assets and DLT can no longer

be dismissed as a passing trend but one which warrants serious consideration.

To facilitate the most accurate legal analysis in this study of cryptographic property and

applications of DLT in the financial markets infrastructure, this Chapter will give a basic

introduction to the core technical concepts that underpin Bitcoin, the original cryptocurrency,

1 P Valkenburgh, ‘Framework for Securities Regulation of Cryptocurrencies’ (Version 2.0, Coin Centre, August 2018), 4 <https://coincenter.org/files/securities-cryptocurrency-framework-v2.1.pdf > accessed 24 November 2018. 2 Coindesk Website < https://www.coindesk.com/price/Bitcoin > accessed 17 December 2018. 3 R Kemp, ‘The Fourth Industrial Revolution: Blockchain and Smart Contracts,’ (The Lawyer 6 June 2016) < https://www.thelawyer.com/issues/6-june-2016/the-fourth-industrial-revolution-blockchain-and-smart-contracts/ > accessed 9 September 2017. 4 Such as central banking: Bank of International Settlements, Committee on Payments and Market Infrastructures Markets Committee, ‘Central Bank Digital Currencies’ (March 2018, CPMI Paper No 174) < https://www.bis.org/cpmi/publ/d174.htm > accessed 3 November 2018; ‘Distributed Ledger Technology in Payment, Clearing, and Settlement: An Analytical Framework’ (February 2017, CPMI Paper No 157) < https://www.bis.org/cpmi/publ/d157.htm > accessed 3 November 2018; organic beef farming: Beefchain Website < https://beefchain.com/ > accessed 18 January 2019; diamond companies: Everledger Diamond Platform Website < https://diamonds.everledger.io/ > accessed 20 March 2018.

22

and Ethereum, the original smart contract decentralised ledger, before touching briefly on

more recent initiatives.

It is worth, however, beginning with a clarification of terms. The acronym “DLT” is often used

for both “decentralised ledger technology” and “distributed ledger technology,” and also as a

synonym for “blockchain technology.” Whilst the terms “distributed” and “decentralised” in

respect of ledgers are not always used as exact terms of art and are, in many respects, broadly

similar, there is a key technical distinction often drawn. The term ‘distributed’ used in respect

of a database often simply means that the data may be accessed across any number of

different computers or devices. For example, data stored on the cloud, such as in

GoogleDrive, may be accessible from any number of devices connected to the internet, but all

data requests are still processed through a central server; i.e., in the case of GoogleDrive, one

belonging to Google, which maintains the single, definitive record of data stored. On the other

hand, ‘decentralisation’ refers a wholly peer-to-peer system of storing and recording data; i.e.,

without the use of a single, trusted intermediary to maintain the ‘master’ record. Decentralised

systems, instead, rely on various different types of consensus mechanisms according to which

participants in the system ‘vote’ or ‘agree’ on what is taken to be the definitive record of data

stored. In this context, “blockchain” is simply one such consensus mechanism, and which was

first used in the context of Bitcoin. Although, therefore, “blockchain” in the strictest sense

refers to the decentralised ledger underpinning Bitcoin, this paper will use the term to refer to

decentralised ledgers generally, unless otherwise indicated.

3.1. Bitcoin5 Although intuitive to consider cryptocurrencies as a kind of ‘digital coin,’ for present purposes

it is more helpful to consider Bitcoin as a particular technique used to clear and settle

payments. Although clearing and settlement are recognised as “basically a matter of practice,

rather than of law,” the banking law authorities have also recognised that “certain aspects of

the procedure are relevant for defining the legal roles assumed by the parties.”6 It is, therefore,

worth considering this process, rendered novel by use of a blockchain, in greater detail.

5 Approximately 3000 words from this Part (part of the explication of Bitcoin) was taken from a past paper ‘Bitcoins, Blockchains, and Decentralised Ledgers: Does Situs Actually Matter? (LL.M Dissertation, City Law School, City, University of London, September 2018). 6 EP Ellinger et al, Ellinger’s Modern Banking Law (5th ed, OUP 2011), 577.

23

3.1.1 The Blockchain

At the most basic level, the blockchain is simply a record of all transfers of Bitcoin between

Bitcoin users. Transfers, known as ‘spends’ in Bitcoin parlance, are grouped temporally and

recorded on ‘blocks’ which are created, on average, every ten minutes.7 Suppose, then, that

blocks are exactly created on the hour (00:00, 00:10, etc), and that Alice sends five Bitcoins

to Bob, who receives them at 12:30; then Bob sends three to Charlie at 12:52. Alice’s transfer

will be recorded on the block created at 12.30, Block X, thereby confirming that Bob is now

the owner of those five Bitcoins. Bob’s payment to Charlie will be recorded on the block at

13.00, Block X+3, or sometime shortly after.

Older blocks are not ‘updated’ by newer blocks. Rather, each newly mined block, known in

this context as the ‘child’, is linked to the block immediately preceding it in time, known as the

corresponding ‘parent.’ Each parent is also a child to its own parent, which is child to its own

parent, and so on all the way back to the ‘genesis’ block,8 which records the creation of the

very first Bitcoin through its transfer on 3 January 2009.9 The cumulative record, known as

the ‘blockchain’ is freely available to download on an open licence to be accessed in real

time.10 Any device connected to the Bitcoin network is known as a ‘node’.11

Although conclusive of past spends, the blockchain is merely a record that such-and-such

transactions have occurred. It is, crucially, independent of any interaction between users in

sending Bitcoins inter se. To illustrate, consider Alice’s act in transferring Bitcoins to Bob as

the equivalent of Alice handing him a non-negotiable cheque. This is, essentially, an

unequivocal order by the drawer (Alice) to the drawee (Alice’s bank) to pay the payee (Bob)

the stated sum. Although handing such a cheque to Bob demonstrates a clear commitment

by Alice to pay him, transfer of the cheque does not in itself transfer ownership of the £100.

Instead, Bob must first cash the cheque with his own bank (the collecting bank) to initiate the

clearing process. Bob’s bank will then physically present the cheque to Alice’s drawee bank,

which will then confirm whether Alice has sufficient credits standing to her account to honour

7 A Antonopoulos, Mastering Bitcoin: Programming the Open Blockchain (2nd ed, O’Reilly Media 2017), 213; 26. 8 Antonopoulos (n 7), 29. 9 Antonopoulos (n 7), 198-199. 10 Antonopoulos (n 7), 31. 11 Antonopoulos (n 7), 25.

24

the payment. If so, Alice’s bank will make payment to Bob’s bank, who collects it as his agent

and deposits it to Bob’s own bank account. If not, the drawee bank will dishonour Alice’s order

to pay Bob, who will find that the cheque has ‘bounced.’ Whereas transfers of value by cheque

are verified by the drawee bank checking the drawer’s account balance, clearing and

settlement in the Bitcoin system relies on cryptography, a branch of a mathematics concerned

with proofs of knowledge widely used in computer and information security.

3.1.2. Cryptographic Numbers and Bitcoin Wallets At the heart of the mathematics underpinning Bitcoin is a cryptographic ‘private key.’ This is

simply a very large and essentially random number (Figure 1),12 which is used to generate

more large and unique numbers through special mathematical functions which enable

calculation of an equation in one direction, but are infeasible to calculate in reverse.13 Such

functions are known as ‘one-way’ or ‘asymmetrical’ and are part of the security design which

renders Bitcoin secure.

Figure 1. A Private Key in Three Different Numerical Formats. Because the number is

so large, it is cumbersome to represent it using the decimal system. Hex stands for

‘hexadecimal’, which is a system of representing numbers using not only the numerals

0-9, but also the letters A through F. WIF is often used to generate QR barcodes (Figure.

5 below).14

12 Antonopoulos (n 7), 58. 13 Antonopoulos (n 7), 57. 14 Antonopoulos (n 7), Table 4-4 at 75.

25

Figure 2. Generating the Public Key and Bitcoin Address from the Private Key.15

For the receive- side of a transaction, two numbers are sequentially generated by applying

one-way functions to the private key in a process known as ‘hashing.’ First, the ‘public’ key,’16

which is then further hashed through the application of different one-way functions to generate

the ‘digital fingerprint.’ This is known as the ‘Bitcoin address’ and functions as the public face

of the public key.17 Essentially, it signals ‘at where’ one receives Bitcoin payments within the

Bitcoin network,18 in the same way that one’s email address is made public to signal to others

‘at where’ in the digital universe one receives email.

For the spend- side, the private key is used to generate a ‘digital signature.’ Each transfer of

Bitcoin requires the payer to ‘sign’ the proposed transaction with this signature; signalling to

other participants in the Bitcoin network that the payment instruction is authentic. A more

critical function, however, is intricately linked to the receive- side of the transaction through

the role the private key, public key, Bitcoin address, and digital signature – essentially, four

numbers – play in establishing the proofs of ownership that are necessary for any given

transaction to be included on any block, thereby indicating settlement. Thus, although we did

not know at what time Alice transferred five Bitcoins to Bob, inclusion of the transaction on

Block X at 12:30 indicates all the clearing requirements were met19 so that Bob is now

recognised as the ‘owner’ of those five Bitcoins.

The cryptographic proofs which constitute the Bitcoin clearing process revolve around the

precise mathematical relationships underpinning the four numbers. Whilst it is possible to

begin with the private key, apply the relevant one-way function, and then generate the public

key and Bitcoin address, it is infeasible20 to begin from any of the latter two to calculate the

15 Antonopoulos (n 7), Figure 4-1 at 57. 16 Antonopoulos (n 7), 60. 17 Antonopoulos (n 7), 64-65. 18 Antonopoulos (n 7), 65. 19 Antonopoulos (n 7), 29. 20 Antonopoulos (n 7), 56.

26

private key in reverse (Figure 2). What is, however, possible is verification that the digital

signature, Bitcoin address, and the public key – given the mathematical relationships between

them – were generated from the same private key. This can be done without disclosing the

private key itself, which must remain private.

These concepts underpin a Bitcoin spend roughly as follows. Assume Alice is the legitimate

holder of the five Bitcoins when she sends them to Bob’s Bitcoin address. Having received a

legitimate payment to this particular Bitcoin address, the mathematical relationships

underpinning Bob’s private key, public key, Bitcoin address, and signature will prevent Bob

from spending any of those coins in turn; unless he can also ‘sign’ his spends using the digital

signature derived from the same private key which lies at the root of his Bitcoin address.

Hence, although digital signatures are used on the spend-side of a transaction, they also

function as a mechanism on the receive-side which ensures that only a rightful transferee of

Bitcoin can ‘unlock’ its value by transferring it on to another user (Figure 3). This is critical for

use of Bitcoin as a means of exchange because, just as a paper banknote is worthless in itself,

Bitcoins have no intrinsic value. Having received five Bitcoins from Alice is of no value to Bob

unless he can send them on to someone else as payment in exchange for some other

economic resource. This is only possible if Bob can sign payments using the digital signature

generated from his private key.

Figure 3. Bitcoin Transactions21

21 S Nakamoto, ‘Bitcoin: A Peer-to-Peer Electronic Cash System’ (2008), 2 < http://nakamotoinstitute.org/Bitcoin/ > accessed 5 January 2018.

27

The private key, thus, is said to lie “at the root of all ownership in the Bitcoin system”22 and,

although secure in that they cannot be calculated in reverse from public keys, Bitcoin

addresses, or digital signatures, private keys are nonetheless vulnerable. Once generated

according to cryptographic standards of randomness, it is up to Bitcoin users to ensure their

private keys are kept secure. Generally, the safest way is to generate the private key offline,

record it physically on paper or storing it on a USB, then ensure that piece of paper or USB

stays safe.23 Such offline methods of storing private keys are known as ‘cold’ storage or ‘in

cold wallets,’ and are contrasted with ‘hot wallets’ in which private keys are kept in online

Bitcoin accounts or wallet apps downloaded to mobile devices.

Figure 4. Printout of Private Key and Address. This is the most basic method of storage.24

Figure 5. Simple Paper Wallet. Note the user-friendly ‘translation’ of keys into scannable

QR barcode form, and detachable backup copies (right) in case of loss or damage.25

22 Antonopoulos (n 7), 58. 23 Antonopoulos (n 7), 273. 24 Antonopoulos (n 7), Table 4-9 at 88. 25 Antonopoulos (n 7), Figure 4-12 at 91.

28

Since Bitcoin was launched, there have been considerable developments in wallet technology,

and software-based wallets now offer other functions to key and address management.

Software wallets come in two main types, distinguished by whether the private keys they

contain are related to each other or not. The first kind of Bitcoin wallet, now called Bitcoin

Core, was a collection of 100 pre-generated private keys, each generated from a different

random number, which were each used only once for security purposes (Figure 6). Further

keys were then generated as needed.26 Such wallets with unrelated keys are called ‘non-

deterministic’ wallets and are sometimes referred to as JBOK: ‘just a bunch of keys.’ Use of

non-deterministic, or ‘random’ wallets is now discouraged by Bitcoin developers, given that

frequent copies and backups are required when each new key is generated.27 These wallets

are, thus, being replaced by deterministic wallets, which contain private keys generated from

a single ‘seed’ unique number combined with other data to derive the private keys (Figure 7).

Given that all keys can be derived from the seed, a single backup at creation is sufficient.28

Figure 6. Type-0 Non-Deterministic ‘Random’ Wallet; ‘Just a Bunch of Keys’29

26 Antonopoulos (n 7), 94. 27 Antonopoulos (n 7), 94. 28 Antonopoulos (n 7), 95. 29 Antonopoulos (n 7), Figure 5-1 at 95.

29

Figure 7. Type-1 Deterministic ‘Seeded’ Wallet30

Figure 8. Type-2 Hierarchical Deterministic wallet31

The most sophisticated type of deterministic wallet is the ‘hierarchical’ deterministic wallet, in

which a master key is derived from the seed, from which further ‘child’ keys can be used, from

which ‘grandchildren’ keys can be derived, and so on infinitely (Figure 8). HD wallets offer

two major practical advantages over random keys. First, the ‘tree’ structure can be used to

implement organisational structures, such as using one branch of keys to receive incoming

payments, and a different branch used to receive change from outgoing payments; or

allocation of different branches to different payees or accounting categories.32 Second, users

can create a sequence of public keys without having to access the private keys, setting up

receive-only addresses using a different public key for each transaction.33

30 Antonopoulos (n 7), Figure 5-2 at 95. 31 Antonopoulos (n 7), Figure 5-3 at 96. 32 Antonopoulos (n 7), 96. 33 Antonopoulos (n 7), 96.

30

Multi-signature, frequently abbreviated to ‘multi-sig,’ addresses, on the other hand, offer other

functionalities. Requiring several different signatures to ‘sign off’ a proposed spend, multi-sig

addresses can be useful in corporate settings; generated and stored in different locations and

under the control of different persons to ensure no single person can compromise the funds.34

Although there are, thus, many technical differences between different types of wallets, most

retail users are most familiar with software wallets simply through its function as the interface

through which they connect to the Bitcoin network and make payments to other users.

Considered at this level, wallets are a kind of Bitcoin node; participating in the Bitcoin network

and its information flows. ‘Retail’ user wallets, however, usually translate the code

underpinning the network into a more user-friendly interface resembling an ordinary banking

app. Further, given the amount of storage space required, most ‘retail’ wallets do not store

copies of the entire blockchain; only the transactions relevant to that particular user. Such

wallets are called ‘Simple Payment Verification/SPV’ nodes and differ from the nodes used by

the miners who maintain the blockchain.35

3.1.3. Clearing A Bitcoin Transaction

Drawing all these elements together, suppose that Charlie were an antiques retailer and

received the three Bitcoins from Bob in payment for two antique chairs. At user level, Bob’s

and Charlie’s SPV mobile wallet apps will first generate unique private keys, public keys,

Bitcoin addresses, and digital signatures. Charlie will then determine the price using a GBP-

BTC exchange rate and inform Bob of her Bitcoin address. Bob inputs these details into the

‘Send To’ and ‘Amount’ in the payments section of his wallet, then taps ‘Confirm.’ At this stage,

the exchange is at a comparable stage of development to if Charlie had just been handed a

cheque in payment for the chairs. As the cases on contractual mistake and cheques shows,

Charlie would be wise not to part with the chairs until the payment clears.

34 Antonopoulos (n 7), 274. 35 Antonopoulos (n 7), 172.

31

From a clearing perspective, Bob’s spend comprises two transaction elements: an input and

an output. The input refers to the transaction through which Bob received the Bitcoins he is

currently trying to send to Charlie.36 Assume Bob owns only the five Bitcoins he received from

Alice; transfer of which was recorded in Block X at 12:30. As will be clear by now, Bob cannot

spend any of these unless he can sign his intended payment to Charlie with the private key

which corresponds with the Bitcoin address to which Alice had sent those five Bitcoins. The

output refers to the payer’s current spending intentions, known in traditional banking terms as

the mandate or order, and represents a small ‘chunk’ of Bitcoin which is recognised by the

Bitcoin network as available for spending. Hence, they are called ‘unspent transaction

outputs/UTXO.’37 For current purposes, assume that in Bob’s case the output will be a transfer

of three Bitcoins to Charlie’s Bitcoin address, and a small additional amount as the mandatory

transaction fee.38

When Bob confirms this spend - or more accurately, his mandate - in his wallet, the wallet

connects to the Bitcoin network and ‘broadcasts’ his mandate to the nearest nodes. These will

verify the transaction against a checklist of cryptographic criteria, including: (i) whether the

transaction using Bitcoins received from Alice has been validly signed by Bob’s digital

signature; (ii) the provenance of Bob’s input data (that is, the inclusion of Alice’s transfer to

Bob on a previous block on the blockchain); and (iii) verification that the input has not been

already used for a corresponding output since (that Bob has not already spent the relevant

coins in another transaction).39 If the transaction does not come up to proof, it will be rejected

by the first node to encounter it.40 Otherwise, the node will broadcast the mandate to its own

neighbouring nodes, which will verify it again against the same list of criteria; then, if valid,

broadcast on to their own neighbours. The process is repeated simultaneously, ’flooding’ the

Bitcoin network, until every single node has received notice of the transaction. This takes a

few minutes.41

If Bob’s proposed transaction is successfully propagated to the entire network, it passes the

first line of security which renders Bitcoin secure. Settlement has not yet been effected, and

the spend exists in the Bitcoin system as a verified but unconfirmed transaction. As such, it

36 Antonopoulos (n 7), 123-125. 37 Antonopoulos (n 7), 119-122. 38 Antonopoulos (n 7), 126-130. 39 Antonopoulos (n 7), 218. 40 Antonopoulos (n 7), 218. 41 Antonopoulos (n 7), 25.

32

temporarily ‘waits’ in lists known as ‘memory pools/mempools’42 which are maintained by

nodes for various different purposes. In Charlie’s case, her SPV node will register Bob’s

transaction as corresponding to her private key, as well as verifying and broadcasting it.

Mining nodes also verify and broadcast transactions, but also register verified unconfirmed

transactions as part of the solution to a mathematical puzzle, known as the Proof of Work

Algorithm.43 Miners compete to be the first to find a solution to this puzzle, which results in

both (i) the creation of the latest block to be added to the blockchain,44 thereby effecting

settlement of all verified unconfirmed transactions included in the solution;45 and (ii) the

creation of new Bitcoins, which go to the winning miner as a prize. 46 This competition

constitutes the second layer of Bitcoin’s security.

3.1.4. Mining Blocks

To appreciate how the Proof of Work Algorithm functions as a security measure, it is helpful

to consider the problem it was designed to solve. The ‘Byzantine Generals’47 problem has

long been considered in computer science, originally known in this context as the ‘interactive

consistency problem,’ and focuses on a network of computers reaching consensus in the

presence of a ‘weak link’ faulty computer. The problem is popularly known in the terms of the

eponymous allegory: a number of army generals must decide whether to attack a city or retreat

but must decide by at least a majority. The decision-making process is complicated due to

the facts that the generals only communicate by messengers, who may or may not be

trustworthy; and the potential for treacherous generals sending different messages to each of

his peers. In the Bitcoin context, this problem manifests in the question of how mining nodes

can reach consensus as to whether transactions broadcast to the network should be rejected

or accepted as valid.

Traditional banking ledgers ultimately rely on a trusted third party to maintain the definite

‘master’ record, which ensures that the same money in the hands of one person cannot be

42 Antonopoulos (n 7), 219. 43 Antonopoulos (n 7), 219-220. 44 Antonopoulos (n 7), 28; 238. 45 Antonopoulos (n 7), 28-29. 46 Antonopoulos (n 7), 215. 47 L Lamport et al, ‘The Byzantine Generals Problem’ (SRI International 1982) < https://people.eecs.berkeley.edu/~luca/cs174/byzantine.pdf > accessed 4 April 2019.

33

spent twice. For the cheque, Bob simply must trust that Alice’s drawee bank will keep an

accurate record of Alice’s checking account, and that the central bank will keep accurate

records of the respective drawee and collecting bank, to ensure that the £100 currently to the

credit of Alice’s account was not, in fact, used by Alice to pay someone else in a previous

transaction. Trust is, therefore, highly concentrated in these third parties, rendering the entire

banking system highly susceptible to fraud, hacks, or abuse.

Bitcoin was, therefore, conceived of as an alternative: a decentralised method of financial

accounting ultimately relying on peer-to-peer consensus regarding transaction histories to

ensure no coin is double-spent.48 Given, however, that anyone can operate a mining node

simply by downloading the full source code, the key obstacle had long been developing a way

to ensure all miners can trust one another sufficiently to reach such consensus - without

recourse to a third party occupying an privileged position of authority. To this end, the

blockchain relies on a combination of incentives, deterrents, independent verification, and

indirect voting by each member of the mining community. The primary incentive is the reward

of new Bitcoins and the transaction fees each user will have included in their spend.49 This is

off-set against the cost of mining: the considerable computing power and electricity required

to compete in the Proof of Work competition.50

This involves preparing a candidate block for the next block due to be created;51 which

constitutes, inter alia: (i) a bundle of verified unconfirmed transactions which are waiting in the

mempool to be cleared;52 (ii) a ‘coinbase’ transaction to the miner’s own Bitcoin address which

represents all transaction fees included in this bundle of transactions;53 and (iii) a reference to

the parent block which the miner considers the most recent, valid block on the blockchain and

to which the miner intends his candidate block to be attached as child.54 Having prepared

these details, the competition then comprises finding a variable data point, the ‘nonce’, to

complete the candidate block.55 Crucially, this must yield a specific result when the completed

candidate block is hashed, 56 and the correct nonce cannot be found other than by way of trial

48 Nakamoto (n 21), 1. 49 Antonopoulos (n 7), 214. 50 Nakamoto (n 21), 4. 51 Antonopoulos (n 7),220. 52 Antonopoulos (n 7), 220. 53 Antonopoulos (n 7), 221-222. 54 Antonopoulos (n 7), 227. 55 Antonopoulos (n 7), 228. 56 Antonopoulos (n 7), 228.

34

and error, through quadrillions of individual possibilities.57 The processing power required is,

therefore, considerable; one study estimating that the electricity consumption by the Bitcoin

network is comparable to the entire consumption of Ireland.58 Any realistic chance of success

requires highly specialised processing chips and hardware costing several tens of thousands

of pounds, which are upgraded every year or so.59 Consequently, it has been for some years

unprofitable for miners to operate ‘solo’ as a hobby using a standard computer.60

Further, from the perspective of overall security, acquiring a Bitcoin with superior hardware is

not enough; the newly mined block recording its acquisition must also remain on the

blockchain. Closely aligned to the primary incentive, therefore, is reliance on the consensus

of all miners that the winning block is valid. This is secured in two stages. First, when the

winning block is ‘announced’, it will immediately be propagated across the network to be

checked by all other mining nodes against a list of cryptographic criteria. Thus, all mining

nodes will verify the new block to confirm that it is valid.61 Second, when the blockchain is

extended in due course, the newly mined block must be selected as the valid parent block to

which the next child will be attached. Should it be rejected as a valid parent this second stage,

it will then be treated as an ‘orphan’ offshoot not part of the main blockchain and its definitive

record of spends.62 All transactions included in an orphan block, including the reward of new

Bitcoins created with that block, are, therefore, not recognised. Thus, given the possibility of

doubt regarding a newly mined block, transactions are by convention considered cleared

beyond dispute six blocks after it appears and has remained on the blockchain; that is, an

hour after clearing and settlement has been effected.63

57 Antonopoulos (n 7),228. 58 A Vries, ‘Bitcoin’s Growing Energy Problem’ (16 May 2018) Joule 2, 801–809 < https://www.cell.com/joule/fulltext/S2542-4351(18)30177-6 > accessed 30 June 2018. 59 Antonopoulos (n 7), 247; 250. 60 Antonopoulos (n 7), 250. 61 Antonopoulos (n 7), 238-239. 62 Antonopoulos (n 7), 238. 63 Antonopoulos (n 7), 28.

35

Figure 9. Blockchain Forks and Orphan Blocks. Blocks 4b, 7a, and 8a are all orphans

off the main blockchain.64

Given the considerable computing power expended when creating a new block, the chance

that it may subsequently be rejected by other miners acts as a broader deterrent. 65

Blockchain, thus, derives much of its security by relying on “the majority of miners acting

honestly out of self-interest.”66 Although it is not impossible for a miner to propagate fraudulent

blocks - generating payments to himself or reversing his own payments to others67 - there is

little incentive to do so. Not only must the relevant block recording the transaction be altered,

but so must every block which subsequently descends from that particular parent. Given that

this requires the cooperation of the majority of miners, this is computationally infeasible and

economically unviable. Since 2009, the increase of total hashing power has arguably made

Bitcoin impervious to attacks by a single miner.68

3.1.5 Coloured Coins

Since the launch of Bitcoin in 2009, the technology underpinning the network has been used

or adapted for various other applications and functions. One of the first such applications of

the Bitcoin network not envisioned by its White Paper was use of the blockchain to record

similarly the entire transaction history of some external asset. Such assets make use of

‘coloured coins’: certain Bitcoins ‘earmarked’ as representing certain assets amongst a sub-

society of Bitcoin users.69

64 Antonopoulos (n 7), Figure 10-9 at 257. 65 Antonopoulos (n 7), 239 66 Antonopoulos (n 7), 253. 67 Nakamoto (n 21), 6. 68 Antonopoulos (n 7), 256. 69 Antonopoulos (n 7), 279.

36

Coloured Coins are ‘issued’ through an initial transaction which registers the coloured coin on

the blockchain by creating an asset ID as metadata attached to Bitcoin transactions.70 This

ID is used to ‘track’ that asset,71 which is transferred between addresses as usual using

transactions.72 Coloured Coins, however, require use of special wallet software which can

interpret the metadata attached to the relevant Bitcoin transaction. Care is required to avoid

sending coloured coins to regular Bitcoin wallets, which may destroy the coloured coin

metadata.73

3.2. Ethereum and Smart Contracts

A more radical innovation separates the DLT of the blockchain from the cryptocurrency

application entirely and utilises it for other purposes. Of these so-called ‘second generation’

blockchains, Ethereum and its pioneering of decentralised ‘smart contracts’ remains the

original and one of the widely recognised applications of Bitcoin’s underlying DLT as a

powerful innovation in its own right. Although, therefore, Ethereum shares many similarities

with Bitcoin, it is essential to note that Ethereum was developed in pursuit of wholly different

objectives. Whilst there is nothing to stop users from using Ether, Ethereum’s native

cryptocurrency, as an alternative means of payment, Ether, unlike Bitcoin, is not intended as

an alternative to the central banking system. 74 Rather, Ether is intended as a means to access

the Ethereum network to execute computer programmes, known as ‘smart contracts,’ stored

on the Ethereum blockchain.75 For this reason, Ether is not classified as a ‘cryptocurrency’

proper, but a ‘utility’ cryptocurrency76 of limited use outside this very specific context.

Ethereum’s contribution to the recognition and development of DLT as a powerful technology

independent of Bitcoin is its combination of (i) ordinary computer programming, that is,

instructions written in computer code which automate the future execution of pre-defined

70 Antonopoulos (n 7), 280. 71 Antonopoulos (n 7), 278. 72 Antonopoulos (n 7), 280. 73 Antonopoulos (n 7), 279. 74 A Antonopoulos and G Wood, Mastering Ethereum: Building Smart Contracts and DApps (O’Reilly Media 2018), 2. 75 Antonopoulos and Wood (n 74), 26. 76 Antonopoulos and Wood (n 74), 2.

37

functions; with (ii) a decentralised blockchain ledger to store and execute such functions

automatically, then record that such functions have been executed.77

To take a familiar, everyday example, an email account may be programmed today to send

autoreplies to any emails received from tomorrow for a week using an Ethereum-based,

decentralised computer program. If any emails are then received in that inbox, the pre-

programmed autoreply instructions will be triggered, sending the pre-programmed email in

reply. These events would then be recorded in a blockchain ledger as events which Ethereum

miners all agree occurred.

Such ‘events which have occurred’ are known in formal terms as ‘changes in state’ or ‘state

transitions,’ which are then bundled together and recorded on blocks by miners according to

the time at which they occurred according to a consensus algorithm. The cumulative chain of

blocks, recording all changes in states across the network, comprises the single,

decentralised, and public record of ‘what has happened.’ In the previous section, ‘what has

happened’ in the Bitcoin network was largely explicated in terms of ‘transfers’ of value;

although intuitive and accessible for introductory purposes, this is not technically correct. More

accurately, the Bitcoin blockchain records changes in state as to the distribution of UTXOs

across the entire network of public addresses, which change as users broadcast their

intentions to decrease the UTXOs associated with their own address and increase that of their

intended recipient. Whereas the Bitcoin blockchain is limited to recording and tracking

changes in state in such terms of UTXOs across the network, the Ethereum blockchain is

designed to track state transitions of general purpose data.78 In the email example given

above, the changes in state would include at least the programming of the autoreplies, the

email received, and the autoreply sent.

The Ethereum network, thus, has two distinct components: (i) the Ethereum virtual machine

(‘EVM’), a decentralised ‘computer’ which handles the deployment and execution of

programmes over the network; and (ii) the Ethereum blockchain, which records changes in

state using the concepts pioneered by Bitcoin and explicated above (private-public keys,

digital signatures, wallets and nodes, broadcasting transactions, the proof of work consensus

algorithm, etc). Thus, the primary purpose of Ethereum is to ensure execution of pre-

77 Antonopoulos and Wood (n 74), 8 78 Antonopoulos and Wood (n 74), 6.

38

programmed functions and record successful executions in line with the Bitcoin-inspired ideals

of decentralised trust and immutability.79 Unlike the Bitcoin network, which is intentionally

programmed to support a limited number of computing functions, Ethereum’s scripting

language is designed to support a wide range of applications.80 The EVM, thus, is said to lie

”at the heart of the Ethereum protocol and operation”81 and remains its most distinctive feature.

This section will therefore primarily explore how the EVM functions alongside the

cryptographic concepts associated with DLT outlined in the previous section.

3.2.1 Smart Contracts: Transactions and Accounts

It is useful to begin with the clarification that Ethereum ‘smart contracts’ are neither ‘smart’ nor

‘contracts’ in the legal sense. Rather, it is the term which has stuck in Ethereum parlance to

describe “immutable computer programmes that run deterministically82 in the context of an

EMV as part of the Ethereum network protocol.”83 Thus, Ethereum smart contracts are simply

the instructions, written in code, programmed in advance, deployed to and ‘stored’ internally

within the Ethereum network, which then lie dormant until ‘called’ into execution.

To understand how contracts are called, it is necessary to distinguish between two types of

accounts (or ‘nodes’) which are used within Ethereum. First, the ordinary user account

through which Ethereum users access and interact with the network, typically through external

software such as a wallet application.84 Such ‘user’ accounts are known as ‘externally owned

accounts’ (‘EOAs’) and feature all the functions to initiate transactions and manage a user’s

interactions with the Ethereum network.85

‘Contract accounts’ (‘Contracts’), on the other hand, are best thought of as passive ‘storage’

accounts which simply hold data, code, and if necessary, funds. Data and code are

determined and programmed ‘into’ the account at the outset by a (human) computer

programmer, before the prospective Contract is deployed to the Ethereum platform via a

79 Antonopoulos and Wood (n 74), 3-4. 80 Antonopoulos and Wood (n 74), 2. 81 Antonopoulos and Wood (n 74), 297. 82 In this context, ‘deterministically’ means that any given data input will always give the same data output; similarly, any two nodes executing the programmed instructions will always reach the same solution. Antonopoulos and Wood (n 74), 253. 83 Antonopoulos and Wood (n 74), 127. 84 Antonopoulos and Wood (n 74), 127. 85 Antonopoulos and Wood (n 74), 26.

39

special ‘contract creation’ transaction.86 Once a Contract is thus deployed, its programmer has

no further ‘authority’ over nor ownership of it; the Contract becomes wholly self-sufficient and

governed entirely by its internal programming.87 Its code cannot ever be changed or altered,

and only ever deleted if the programmer has specifically programmed in a ‘self-destruct’

function.88 Once deployed, Contracts function as an Ethereum node with the basic features

in common with EOAs, such as identification and receipt of Ethereum transactions at a public

address.89

Ethereum transactions, like spends in Bitcoin, are essentially cryptographically signed

messages broadcast to the network.90 Ethereum transactions consist of seven data points,

which cover details of: (i) the transaction nonce, essentially the transaction number associated

with a node; (ii) the recipient’s Ethereum address; (iii) and (iv) arrangements for transaction

fees; (v) the value of Ether to be sent; (vi) ordinary data, often known as the ‘payload;’ and

(vii) aspects of the sender’s digital signature.91 For present purposes, the most significant

point to note is that Ethereum transactions can only be initiated by EOAs.92 Contracts do not

have private keys93 and cannot execute of any of it is programmed functions unless called by

an Ethereum transaction originating from an EOA. 94

Transactions can be of simple Ether. If the specified recipient is an EOA, it functions as a

simple payment. If the recipient is a Contract, unless a specified response is programmed

into the contract code – such as reject, or transfer to someone else – the Contract will simply

hold the funds. Given that Ethereum is not intended, however, as a means of payment,

transactions will more commonly include specific messages sent in the data payload.

Although this will serve no real purpose if the recipient is an EOA,95 data payloads ‘sent to’ a

Contract will ‘call’ its programmed functions, causing the function to execute using the data

payload as the input. 96 If the function executes in its entirety and terminates (that is,

86 Antonopoulos and Wood (n 74), 112. 87 Antonopoulos and Wood (n 74), 128-9. 88 Antonopoulos and Wood (n 74), 129. 89 Antonopoulos and Wood (n 74), 26. 90 Antonopoulos and Wood (n 74), 99. 91 Antonopoulos and Wood (n 74), 99-100. 92 Antonopoulos and Wood (n 74), 128-9. 93 Antonopoulos and Wood (n 74), 128. 94 Antonopoulos and Wood (n 74), 128-9. 95 Antonopoulos and Wood (n 74),110. 96 Antonopoulos and Wood (n 74), 110-111.

40

‘completes’)97 successfully, the changes effected to the overall, ‘global’ state of the Ethereum

network will be recorded in the Ethereum blockchain.98 If the function fails to complete

successfully, its effects are ‘rolled back’ as though execution had not been attempted. The

failed attempt, however, is recorded on the blockchain.99

3.2.2. Ether, Gas, and Tokens

One reason a function may fail to execute successfully is an insufficient transaction fee. As

with any decentralised ledger, the Ethereum network is resource-intensive; executing smart

contracts consumes considerable processing power. In addition, Ethereum’s scripting

language, designed to support a wide range of applications, poses a particular issue known

in computer science as the ‘halting’ problem. Unlike Bitcoin, which is limited to computing

‘true/false’ functions to assess spending conditions (that is, whether a proposed transaction

has been validly signed and does not propose to send more Bitcoin than is associated with

the relevant public address), the EVM aspect of Ethereum is able to compute any program of

any complexity within the limitations of the EMV’s finite memory capacity.100 Such ‘universal

computability’ is known as ‘Turing completeness,’101 after the English mathematician, Alan

Turing. Turing was the first to prove the halting problem;102 concluding it is not possible to

determine, given an arbitrary program and its input, whether a program will ever stop running

once it has begun to execute.103 In the context of the EMV, the halting problem inherent in

Turing completeness poses serious risks of wasting resources by requests to execute smart

contracts, which may potentially run infinitely with no way of stopping the programme once it

has been called into execution. 104 As a solution, the number of computational steps

permissible in the execution of any given Ethereum smart contract is deliberately limited by a

pre-determined transaction fee.105

97 It is worth noting that ‘termination’ here is not to be confused with ‘termination’ in the legal contractual sense of performance having been interrupted but is used to describe a programme has successfully executed from start to finish. Antonopoulos and Wood (n 74), 129. 98 Antonopoulos and Wood (n 74), 129. 99 Antonopoulos and Wood (n 74), 129. 100 Antonopoulos and Wood (n 74), 8-9. 101 Antonopoulos and Wood (n 74), 8. 102 Antonopoulos and Wood (n 74), 8. 103 Antonopoulos and Wood (n 74), 9. 104 Antonopoulos and Wood (n 74), 314. 105 Antonopoulos and Wood (n 74), 9.

41

To this end, there are three kinds of crypto-assets associated with Ethereum: Ether, Gas, and

Tokens. Ether is Ethereum’s native cryptocurrency and is available on crypto-exchanges. As

noted above, Ether is not intended as an alternative to fiat currency, but is used to access the

Ethereum network. Here, Ether is primarily used to purchase Gas, the unit in which

transactions fees for executing smart contracts is denominated.106 Gas cannot be purchased

outside the context of an Ethereum transaction, where a certain portion of Ether is set aside

for this specific purpose.107 The transaction fee is expressed in terms of the maximum amount

of Gas the sender is willing to expend on executing the smart contract, with each

computational step to be executed fixed with a pre-determined price:108 calling a self-destruct

function, for example, costs 5,000 Gas; every word to be added when expanding memory

costs 3.109 As the EVM executes the smart contract, it accounts for the cost of executing the

instructions expressed in the code by consuming the Gas available in the transaction

message. If this is insufficient to execute the smart contract to termination, execution will

automatically stop when the when the supply of Gas is depleted.110

Tokens, on the other hand, are distinct from Ether and Gas in that they are not intrinsic to the

Ethereum platform.111 Rather, they are a feature of smart contracts and Contracts, which may

be programmed to implement tokens for use within the Contract’s intended application.112 Two

main types of tokens are available. The first type, known as ‘fungible tokens,’ have no unique

properties and are interchangeable with other Tokens in its set or issue. 113 They are

appropriate for Contracts intended to track dealings in fungible goods or items, such as bulk

goods, commodities, or credits to a bank account.

To illustrate, suppose a commercial bank (‘Blockchain Bank’) decided to move its banking

ledger onto the Ethereum blockchain and deployed a Contract (‘Code Blockchain Bank’) to

manage its consumer banking ledger. Code Blockchain Bank would be programmed and

deployed on the Ethereum network as a contract account, implementing Blockchain Bank

Tokens representing its capital. Other functions will be included in the code to govern

106 Antonopoulos and Wood (n 74), 314. 107 Antonopoulos and Wood (n 74), 9. 108 Antonopoulos and Wood (n 74), 314. 109 G Wood, ‘Ethereum: A Secure Decentralised Generalised Transaction Ledger,’ (‘the Yellow Paper,’ Byzantium Version 4e05aa0 4 March 2019), Appendix G ‘Fee Schedule’ < https://github.com/Ethereum/yellowpaper > accessed 24 March 2019. 110 Antonopoulos and Wood (n 74), 315. 111 Antonopoulos and Wood (n 74), 227. 112 Antonopoulos and Wood (n 74), 227. 113 Antonopoulos and Wood (n 74), 227.

42

transfers, ownership, and access rights to and between Blockchain Bank customers. The

ERC20 standard consists of a number of minimum such functions (Figure 10).

It is important to note that it is the relevant Contract which governs and manages all aspects

of any given token set;114 such governance operates independently of the broader Ethereum

network.115 For this reason, Tokens behave differently to Ether. Ether transferred from one

user to another is recorded as a global change of state in the Ethereum network in terms of

the parties’ EOA Ether balances.116 Transactions to transfer Tokens, on the other hand, are

not ‘sent’ to the recipient’s EOA, but use the relevant Contract address as the intended

recipient. This calls the Contract’s transfer function, which adjusts the balances between user

addresses mapped within its internal contract state.117 Thus, unlike Ether, Tokens are not

associated with users’ EOAs; rather, the users’ EOAs are stored internally within the Token

Contract.118 Unless the user adds the specific Token Contract to their wallets to ‘watch’ or

manually call the Contract’s ‘balanceOf’ function, they will not be aware of any Tokens

received to their EOA wallet.119

If, therefore, Alice and Bob are both customers of Blockchain Bank, Code Blockchain Bank

will store both their EOA addresses internally. If Alice wishes to send Bob 2 Blockchain Bank

Tokens, she sends a transaction with data input containing the relevant mandate from her

EOA with Code Blockchain Bank as the recipient. The data input then calls Code Blockchain

Bank’s transfer function. If Alice has included enough Ether to cover the Gas, Code

Blockchain Bank will internally adjust Alice’s and Bob’s Blockchain Bank Token balances and

issue a ‘transfer’ event.120 This will be a change in state recorded on the Ethereum blockchain

involving only Code Blockchain Bank’s Account and Alice’s Ether (not Token) balance; no

change in state is recorded for Bob’s EOA.121

114 Antonopoulos and Wood (n 74), 227. 115 Antonopoulos and Wood (n 74), 227. 116 Antonopoulos and Wood (n 74), 242. 117 Antonopoulos and Wood (n 74), 230 and 242-243. 118 Antonopoulos and Wood (n 74), 243. 119 Antonopoulos and Wood (n 74), 242-243. 120 Antonopoulos and Wood (n 74), 230. 121 Antonopoulos and Wood (n 74), 242.

43

Figure 10. ERC20 Token Standard Functions.122

The second type of Token is non-fungible tokens, often known as ‘deeds,’ which are

distinguished by a unique 256-bit identifier.123 Whereas fungible tokens are mapped internally

by the Contract by final balances associated with user addresses, non-fungible tokens are

mapped and tracked according to this identifier.124 This enables the entire transaction history

of the token to be traced; deeds are, thus, suitable to represent dealings in and transfers of a

specific item, such as a Ming vase, debt instrument, or a house. There is currently a proposal

for a standard non-fungible deed, known as the ECR721.125

122 Antonopoulos and Wood (n 74), 228. 123 Antonopoulos and Wood (n 74), 247. 124 Antonopoulos and Wood (n 74), 247. 125 Antonopoulos and Wood (n 74), 247.

44

3.2.3. Oracles

Another feature of Ethereum is the use of systems, known as Oracles, which provide external,

‘off-chain’ data sources to Ethereum Contracts.126 This significantly broadens their capacity

to automate, execute, and enforce agreements ‘in the real world.’ A will smart contract, for

example, may be programmed to distribute assets according to the wishes of the ‘smart

testator’ upon his death. Oracles are designed to solve the obvious obstacle to the real-life

usefulness of a smart will: how would that Contract know when the testator has died? Such

random data cannot be pre-programmed; the EVM intrinsically cannot support random

functions without compromising the ability for nodes to reach decentralised consensus.127 The

only way, therefore, that extrinsic data concerning the testator’s death can be introduced into

the Ethereum network is within the data payload component of an Ethereum transaction128 to

be then viewed by other accounts.

Oracles have three main components:129 (i) collection of off-chain data; (ii) transfer of the data

‘on-chain;’ and (iv) making the data available across the network by storing it in a special

Oracle Contract. Once stored, other users and Contracts can view the data by sending a

transaction calling the Oracle’s ‘retrieve’ function. Alternatively, the data may be viewed by

looking directly into the Oracle’s storage.130 There are three main ways to set up an Oracle,

which differ only in the way in which the extrinsic data is stored and viewed by other nodes.131

3.2.4. Web3: Decentralised Applications Apps

Much like the way in which Bitcoin was conceived as an ideal, or even utopian alternative to

the central banking system, the founders of Ethereum too developed a much broader vision

than simply decentralising the controlling logic and payment functions of computer

programmes as a smart contract programmed and executed on a blockchain. Instead, they

held the ambitious objective of transforming the way in which the internet operates through

decentralising all aspects of web applications using peer-to-peer networks rather than central

126 Antonopoulos and Wood (n 74), 254. 127 Antonopoulos and Wood (n 74), 253. 128 Antonopoulos and Wood (n 74), 253. 129 Antonopoulos and Wood (n 74), 255. 130 Antonopoulos and Wood (n 74), 256. 131 Antonopoulos and Wood (n 74), 256-258.

45

servers. Such decentralised web applications are known as Decentralised Applications, or

DApps, and consist, at the very least, of (i) a smart contract programmed onto a blockchain,

which controls the ‘back-end’ programming logic of the function; and (ii) a ‘front-end’ web-

based user interface.

Figure 11. Internal logic of an auction DApp. First, a Contract implementing an ERC721

deed to represent the chair is created and deployed. Ownership of the deed is then

registered to an Auction House Contract, which is programmed with functions which

govern the bidding process.132

3.3. Further Developments Since the launch of Ethereum, there have been no shortage of new blockchain initiatives,

many of which have been designed for and tailored to particular use cases. These are typically

developed by technology firms privately, resulting in proprietary software to which access or

mining may be restricted by the operator of the network or contractual licensee of the software.

Such ‘closed’ or ‘permissioned’ networks are distinguished from Bitcoin and Ethereum, which

are both open source and free to use by all under open licences.133 It is arguable that closed

132 Antonopoulos and Wood (n 74), Figure 12-2 at 272. 133 Bitcoin uses the MIT Creative Commons Licence: < https://Bitcoincore.org/en/download/ > accessed 15 July 2018, which is available at < https://opensource.org/licenses/mit-license.php > accessed 15 July 2018. Ethereum uses several different licences, but adheres to the principles that (i) Ethereum is both open source software and Free software after the definition of the Free Software Foundation (so-called FLOSS); (ii) no special treatment is given to any single entity concerning the copyright of the software, the Ethereum Foundation included; and (iii) source-code will not be

46

networks mark a major departure from the original ideal of decentralised, peer-to-peer trust.

On the other hand, the case studies show that such compromises may well be necessary if

DLT is to be used in ‘real life’ applications.

In the finance sector, JP Morgan’s Quorum and r3’s Corda are two notable platforms

developed for use by and between financial institutions inter se. Along with Ethereum, these

comprise the only three platforms for which Thompson Reuter’s BlockOne IQ oracle is

available to provide financial markets data.134 A brief outline of the distinctive features of each

is mentioned for the sake of completeness.

3.3.1. JP Morgan’s Quorum

Quorum is built on top of the Ethereum blockchain and was developed by JP Morgan with

transaction privacy in mind.135 To prevent all except those party to the transaction from

accessing confidential or sensitive data, Quorum implements a single shared blockchain used

in conjunction with a combination of smart contract architecture and modifications to

Ethereum, including to the way in which new blocks are proposed and validated.136 All nodes

validate public transactions and any private transactions they are party to by executing the

contract code associated with the transactions.137 For other “private transactions,” a node will

simply skip the contract code execution process. 138 This results in a segmented state

database (Figure 12): a public state database in respect of which all nodes are in consensus,

and a private state database which records only the transactions to which that node is party

or otherwise is permitted to access.139

distributed ahead of binaries. See further < https://github.com/Ethereum/wiki/wiki/Licensing > accessed 18 June 2019. 134 Thompson Reuters BlockOne IQ Website < https://blockoneiq.thomsonreuters.com/ > accessed 1 May 2019. 135 JP Morgan, ‘Quorum White Paper’ (24 August 2018, Version 2), [1]; 1. < https://github.com/jpmorganchase/quorum/blob/master/docs/Quorum%20Whitepaper%20v0.2.pdf > accessed 17 March 2019. 136 JP Morgan (n 135), [2] at 1. 137 JP Morgan (n 135), [2] at 1. 138 JP Morgan (n 135), [2] at 1. 139 JP Morgan (n 135), [2] at 1.

47

Figure 12. Quorum Segmented State Databases.140

140 JP Morgan (n 135), Figure 2 at 2.

48

3.3.2. r3’s Corda

Corda is a new blockchain platform altogether and was designed by r3, an enterprise software

firm, to be used in highly regulated and complex financial markets.141 To this end, it leads a

consortium of market participants, which, originally began with nine financial institutions:

Goldman Sachs, Barclays, JP Morgan, State Street, UBS, RBS, Credit Suisse, BBVA and

Commonwealth Bank of Australia.142 Two versions of the platform are currently available, the

original, free, open source project, Corda, and its commercial version, designed specifically

for use by businesses, known as Corda Enterprise.

If Quorum focuses on transaction privacy, Corda emphasises off-chain ‘real-world’ usage and

legal enforceability. The Corda White Paper begins with its vision:

The end state vision is one where real-world entities manage legally-enforceable

contracts, and transfer value without technological constraints or loss of privacy.143

With legally enforceable transactions in mind, Corda is distinguished for being something of a

hybrid between permissioned and unpermissioned networks. Corda differs from permissioned

networks in that it is designed to allow multiple groups of users, called ‘business networks’144

to co-exist and interoperate across the same platform. Although each business network is

expected to comprise a group of Corda participants who collaborate for a specific business

purpose and, thus, impose their own membership criteria for entry,145 Corda is designed to

allow nodes to participate in other business networks or transact directly with other nodes at

the same time and with the same infrastructure.146

At the same time, Corda also differs from unpermissioned networks in that the network is

governed by a common set of standards, parameters and associated governance processes

for the network of nodes, which is known as the Global Corda Network. These common

141 r3 Website < https://www.r3.com/history/ > accessed 18 April 2019. 142 J Kelly, ‘Nine of the World’s Biggest Banks Join to From Blockchain Partnership’ Reuters (London, 15 September 2015) < https://www.reuters.com/article/us-banks-blockchain/nine-of-worlds-biggest-banks-join-to-form-blockchain-partnership-idUSKCN0RF24M20150915 > accessed 8 August 2018. 143 RG Brown, ‘The Corda Platform: An Introduction,’ (May 2018, Version 2), 1 < https://docs.corda.net/_static/corda-platform-whitepaper.pdf > accessed 13 October 2018. 144 Brown (n 143), [5.1]. 145 Brown (n 143), [5.1], [5.2.1]. 146 Brown (n 143), [5].

49

standards and parameters not only enable interoperability between business networks, but

also ensure that the network operates in the interest of its participants to achieve transaction

legality, finality and privacy.147 To this end, the Corda Network Foundation was incorporated

as a not-for-profit Dutch Stichting on 4 December 2018,148 to take over from r3 governance of

the network according to governing guidelines, articles of association, and bye-laws. A

transitional board of directors was elected in April 2019149 to hold office until ‘democratic

elections’ are held in Spring 2020.150 Another difference with unpermissioned networks lies in

the fact that access as a participant requires and application for admission.151 The Global

Corda Network provides an identity framework and service, linking public keys to real-world

identities so that businesses can enter into real-world contracts.152 Such identity services

were, in May 2018, envisioned as being a ‘bring your own identity’ model whereby participants

provide signed attestations from trusted third parties, with the overall process overseen by the

Corda Network Foundation.153

3.4. Summary

Decentralised ledger technologies and cryptographic assets present an unprecedented

challenge for private law and legal concepts of property. This section set out the basic

principles underpinning such technologies to inform a legal analysis which adequately takes

into account the essential characteristics of its subject, with the ultimate objective of

developing the most rational and robust system of legal ownership in cryptographic assets

that is possible.

147 Brown (n 143), [5]. 148 Corda Network Foundation Website < https://corda.network/governance/articles.html > accessed 18 March 2019. 149 Corda Network Foundation Website < https://corda.network/governance/board-election.html > accessed 18 March 2019. 150 Corda Network Foundation Website < https://corda.network/ > accessed 18 March 2019. 151 Corda Network Foundation Website < https://corda.network/participation/pre-joining.html > accessed 18 March 2019. 152 Brown (n 143), [5.2]; [5.2.3]. 153 Brown (n 143), [5.2.3].

50

4. CRYPTO-FINANCIAL ASSETS IN A DLT-BASED MARKET INFRASTRUCTURE Since the launch of Bitcoin and Ethereum, all manner of cryptocurrencies, DApps,

tokenisations, Initial Coin Offerings, and other similar – generally referred to indiscriminately

under the broad umbrella term ‘cryptos’ – have swiftly followed. From established institutions

exploring new methods of streamlining existing practices, to start-ups intent on disrupting the

markets, interest in this new technology continues to grow. It is arguable that a crypto-market

infrastructure, enabling trading of these assets complete with an attendant suite of supporting

services, is now well and truly established; in commercial practice, at least, if not in every

regulatory rule book.

One of the greatest difficulties, however, in developing effective regulatory policy for the crypto

asset market is the diversity of ‘products’ currently being traded under the umbrella term

‘cryptocurrency.’ Several taxonomies have been proposed, as outlined in Tables 1 and 2

below, which immediately demonstrate that not all crypto assets currently traded are relevant

for present purposes. Only ‘Asset’ and ‘Asset-Backed’ tokens may be classified as financial

assets in that they represent investment entitlements against issuers, or traditional investment

securities in intermediated or bearer forms. Only these token types will, therefore, be

analysed to identify the extent to which and in what ways cryptographic form may affect

principles of legal property in financial assets.

This section, however, will first analyse the basic legal property issues raised by crypto-assets

and distributed ledgers generally, before turning to specific applications of DLT and tokenised

financial assets at three specific levels across the existing infrastructure: (i) between issuer

and investor; (ii) ‘top-down’ from the top-tier intermediaries of the settlement systems; and (iii)

between sub-tier custodian intermediaries inter se. Readers unfamiliar with the current

structure of the financial markets infrastructure are referred to Richard Brown’s blogpost on

the topic for an accessible introduction to the key commercial features.1

1 R Brown, ‘A Simple Explanation of How Shares Move Around the Securities Settlement System’ (5 January 2014) < https://gendal.me/2014/01/05/a-simple-explanation-of-how-shares-move-around-the-securities-settlement-system/ > last accessed 1 June 2019.

51

Table 1. The ISSA’s Taxonomy2

Payment Tokens Cryptocurrencies proper, intended to compete with fiat currencies.

Utility Tokens Provide digital access to an application or service.

Asset Tokens Represent investment entitlements against companies; sometimes treated as a new class

of investment security.

Asset-Backed Tokens

Provide absolute rights in rem of an underlying asset, e.g., fine art, real estate, equity, fixed income, gold, or intellectual property.

Table 2. The FINMA’s Taxonomy3

Payment Tokens

Synonymous with cryptocurrencies are tokens which are intended to be used, now or in the future, as a means of payment for acquiring goods or services or as a means of money or value

transfer. Cryptocurrencies give rise to no claims on their issuer.

Utility Tokens Intended to provide access digitally to an application or service by means of a blockchain-based

infrastructure.

Asset Tokens Represent assets such as a debt or equity claim on the issuer. Asset tokens promise, for

example, a share in future company earnings or future capital flows. In terms of their economic function, therefore, these tokens are analogous to equities, bonds or derivatives. Tokens which

enable physical assets to be traded on the blockchain also fall into this category.

Hybrid Tokens Asset and utility tokens can also be classified as payment tokens. In these cases, the

requirements are cumulative; in other words, the tokens are deemed to be both securities and means of payment.

Fund-Raising Tokens are already put into circulation at the point of the ICO and takes place on a pre-existing

blockchain.

Pre-Financing Investors are offered only the prospect that they will receive tokens at some point in the future

and the tokens or the underlying blockchain remain to be developed.

Pre-Sale Investors receive tokens which entitle them to acquire other different tokens at a later date.

2 International Securities Services Association (‘ISSA’), ‘Infrastructure for Crypto-Assets: A Review by Infrastructure Providers’ (October 2018), Table 1 at 10 < https://www.issanet.org/e/3/reports-and-documents.html> accessed 28 October 2018. 3 FINMA, ‘Guidelines for enquiries regarding the regulatory framework for initial coin offerings (ICOs)’ (16 February 2018) < https://www.finma.ch/en/news/2018/02/20180216-mm-ico-wegleitung/ > accessed 1 December 2018.

52

4.1. Cryptocurrencies: The Basic Premise Whilst there may be some academic debate as to the precise nature of the property right, in

the light of the fact that [the Defendant] does not seek to dispute that [cryptocurrencies]

may be treated as property in a generic sense, I need not consider the question further.

International Judge Simon Thurley QC B2C2 v Quoine1

Given their relative maturity and foundational status as underpinning all subsequent

applications of DLT, Bitcoin and Ethereum remain the most useful case studies through which

to identify and analyse the first principles of legal property in crypto assets. This chapter

therefore begins with an exploration of the general principles of law potentially appropriate to

inform an analysis of crypto assets as the subject of legal property on their own terms and

programming principles.

4.1.1 Private Keys and Blockchains

Notwithstanding wide technical variation between applications, two characteristics may be

identified as definitive for ‘crypto assets’ for present purposes: (i) reliance on a blockchain to

generate a decentralised, immutable, and definitive record of changes in state; and (ii) reliance

on cryptographic key pairs to render proposed changes to the state trustworthy and secure.

One of the central theses of this paper is that it is this combination that creates a unique

challenge in property law: determining the legal significance to be ascribed to each of these

two factors to underpin a rational system of legal property in crypto assets that is fit for

purpose.

The imperative to strike the correct legal balance between the private key and blockchain,

however, is often obscured. One reason for this, at least from a securities law perspective,

may be the fact that the discussion is generally premised on the precedent of the intermediated

system; a global bearer note physically deposited with an ICSD, which in modern practice

1 B2C2 Ltd v Quoine Pte Ltd [2019] SGHC (I) 03, [142].

53

relies on electronic book entries of securities accounts to establish for whose benefit it ‘holds’

the relevant security. Thus, it is often assumed that, because the blockchain can operate as

a definitive record of ‘who owns what’ in a manner prima facie akin to book-entry records

maintained by custodians in respect of securities accounts, the blockchain is, without more, a

register of title, or crypto assets are similarly ‘held’ in the blockchain in the same way that book

entry securities are, at least for the purpose of private international law, legally considered to

be ‘held’ in the accounts of the relevant intermediary.2 This assumption, which has given rise

to concerns regarding the situs and governing law of crypto assets, 3 however, is not

technically correct.

The essential difference with the intermediated system is the absence of any depository

function within the network: mining nodes have cryptographic validation and settlement

functions only. Failure to recognise this fundamental difference risks unduly underestimating

the function of the private key which, considered from the property hallmarks of control,

benefit, exclusion, and transfer, arguably takes precedence over the blockchain as a marker

of ownership. The blockchain is, after all, premised on transactions broadcast across the

relevant network to be verified by mining nodes; only if the cryptographic criteria are fulfilled

will it be included as a change in state recorded on the blockchain.

Hence, the importance of the private key, written in the context of Bitcoin:

Ownership and control over the private key is the root of user control over all funds

associated with the corresponding Bitcoin address. The private key is used to

create signatures that are required to spend Bitcoin by proving ownership of funds

used in a transaction. The private key must remain secret at all times, because

revealing it to third parties is equivalent to giving them control over the Bitcoin

secured by that key. The private key must also be backed up and protected from

2 This is the so-called ‘Place of the Relevant Intermediary Account’ or ‘PRIMA’ approach used in the EU, e.g., Directive 2002/47/EC of the European Parliament and of the Council of 6 June 2002 on financial collateral arrangements [2002] OJ L 168 Art 9; Directive 98/26/EC of the European Parliament and of the Council of 19 May 1998 on settlement finality in payment and securities settlement systems [1998] OJ L 166 (‘SFD’) Art 9(2). 3 ISDA and Linklaters, ‘Whitepaper: Smart Contracts and Distributed Ledgers - A Legal Perspective’ (August 2017), 9 < https://lpslive.linklaters.com/en/about-us/news-and-deals/news/2017/smart-contracts-and-distributed-ledger--a-legal-perspective > accessed 18 December 2017.

54

accidental loss, because if it’s lost it cannot be recovered and the funds secured

by it are forever lost, too.4

Further, by comparison to the popular aphorism ‘possession in nine-tenths of the law’:

…in Bitcoin, possession is ten-tenths of the law. Possession of the keys to unlock

the Bitcoin is equivalent to possession of cash or a chunk of precious metal. You

can lose it, misplace it, have it stolen, or accidentally give the wrong amount to

someone. In every one of these cases, users have no recourse, just as if they

dropped cash on a public sidewalk.5

It is therefore worth analysing what private keys are in law if they are simply a large number

chosen at cryptographic standards of randomness. Within the orthodox property taxonomy,

as devised by Blackstone, private keys are clearly not choses in possession. The obvious

alternative under the existing taxonomy is the chose in action. However, private keys sit no

more comfortably within this category, either; the value derived from the unique character of

a random number proceeds from an entirely different premise from contractual intangibles

which are underpinned by an obligation. Cryptocurrencies proper involve no contractual claim

against any issuer. Nor are disputes with commercial counterparties where cryptocurrencies

have been exchanged as consideration likely to require legal analysis of the private key as a

large and random number; a simple analysis in contract or sale of goods will probably suffice.

Chose in possession and chose in action remain the most obvious categories of personal

property, however, the common law also recognises that certain interests are sui generis. In

Rolls Royce Ltd v Jeffrey (Inspector of Taxes),6 Lord Radcliffe said this in respect of ‘know

how,’ which the appellant, Rolls Royce, submitted should be considered part of their fixed

capital:

…I see no objection to describing this as an asset. It is intangible: but then so is

goodwill. It would be difficult to identify with any precision the sources of the

4 A Antonopoulos, Mastering Bitcoin: Programming the Open Blockchain (2nd ed, O’Reilly Media 2017), 58. 5 Antonopoulos (n 4), 269. 6 [1962] 1 WLR 425, at 430-431. I am very grateful to David Kreltszheim for drawing this authority to my attention.

55

expenditure which has gradually created it and, patents apart, I would not have

thought of it as a natural balance-sheet item...

[…]

An asset of this kind is, I am afraid that I must use the phrase, sui generis. It is not

easily compared with factory or office buildings, warehouses, plant and machinery

or such independent legal rights as patents, copyright or trade marks, or even with

goodwill. “Know-how” is an ambience that pervades a highly specialised

production organisation and, although I think it correct to describe it as fixed capital

so long as the manufacturer retains it for his own productive purposes and

expresses its value in his products, one must realise that in so describing it one is

proceeding by an analogy which can easily break down owing to the inherent

differences that separate “know-how” from the more straight-forward elements of

fixed capital.

The Financial Markets Law Committee (‘FMLC’) has recognised that cryptocurrencies do not

quite fit within the category of choses in action, albeit for the slightly different reason that ‘digital

assets’ cannot be said to be tangible. It therefore proposes a new category of ‘virtual chose

in possession’ for cryptocurrencies 7 as a hybrid. 8 Although welcome, the proposal

nevertheless remains underdeveloped, and crucially, does not recognise nor address the

essential questions of (i) the nature of property in crypto assets as a combination of knowledge

of, control, and possession of a private key, to which changes in state are ultimately ascribed

via the address by reference to a blockchain and public address; (ii) the function of a private

key in verifying spends and unlocking the value ascribed to its corresponding public address;

and, perhaps most crucially, (iii) the essential nature of a private key as a large and random

number. Several proposed alternatives that take these factors into account, therefore, follow.

7 Financial Markets Law Committee (‘FMLC’), ‘Issues of Legal Uncertainty Arising in the Context of Virtual Currencies’ (July 2016), 23 < www.fmlc.org > accessed 18 June 2018. 8 FMLC (n 7), 8.

56

4.1.1.1. Private Keys as Documentary Intangibles9

One possible analysis may be developed by reference to the logic underpinning Professor

Goode’s proposed category of documentary intangibles. Most users of crypto assets use

wallet applications to store private keys, and the specific type of wallet used opens up the

scope of valid considerations when undertaking a legal property analysis by reference to form.

A basic distinction was drawn in Chapter 2 between hot and cold storage methods; hence,

four main types of wallets may further be identified:

1. Paper wallets simply record the private key on paper, either written out in full or in

compressed form, to be safely locked away in a physical safe or vault.

2. Hardware wallets are closely related to paper wallets, and store keys on small devices,

like a USB, which connect to a computer or mobile device via a USB port. Trezor10

and Ledger Nano S11 are two of the market-leaders, both of which confirm transactions

using no more sophisticated technology than two buttons on the devices themselves.

Hardware wallets are the digital equivalents of physically writing out the private key on

a piece of paper then keeping that piece of paper private. These generally operate

wholly offline, so technically classify as cold storage.

3. Mobile and desktop wallets are software-based applications that are downloaded to a

mobile or computer and stored within the local hard drive. Mycelium and Jaxx are two

of the most well-known, and, although make more use of software than paper or

hardware wallets, are still technically cold-storage methods as keys are stored offline.

4. Web wallets, on the other hand, are fully electronic methods of storage which hold

keys on the internet - or, technically, on the relevant hosting server.

From a documentary intangibles perspective, paper wallets are least problematic: the number

that is the private key can be ascribed to the piece of paper upon which it has been written in

the same way in which the obligations underpinning financial assets have benefitted from the

9 Approximately 500 words (on the documentary intangibles analysis) were taken from a past paper ‘Bitcoins, Blockchains, and Decentralised Ledgers: Does Situs Actually Matter? (LL.M Dissertation, City Law School, City, University of London, September 2018). 10 Trezor Website < https://trezor.io/ > accessed 4 April 2019. 11 Ledger Website <https://www.ledger.com/ > accessed 4 April 2019.

57

‘benevolent fiction’ of being treated as the piece of paper upon which they were recorded.

Hence, it is no stretch to apply this same reasoning to files stored on a physical device (in the

case of hardware wallets) or a computer or mobile phone’s local hard drive (desktop and

mobile wallets). Appropriation of private keys stored on any of these kinds of wallets will

(possibly) amount to (i) theft of the paper, Trezor or Ledger device, or computer or mobile

device, contrary to s 1 of the Theft Act 1968; and (ii) the tort of conversion.

The extent, however, to which each of these actions will vindicate an owner’s rights –

assuming that the essential elements of the action or offence are made out at all – will largely

depend on the type of wallet used. If Alice has Bob’s permission to use his laptop, finds a

private key file stored on a desktop wallet, then prints it off without his knowledge, has Alice

appropriated property, defined at s (1)(4) of the Theft Act 1968, belonging to Bob for the

purpose of the actus reus of theft and with the intention of ‘permanently depriving’ Bob of it?

Has Alice taken anything “with the intent of exercising over the chattel an ownership

inconsistent with the real owner's right of possession"12 for the purpose of conversion?

A more pressing issue is that recourse to the physical thing upon which the private key is

recorded is obviously inappropriate when the private key is kept in hot storage. Any person

appropriating private keys from a web wallet is more likely to have committed unauthorised

modification of computer material, contrary to section 3(1) of the Computer Misuse Act 1990

than theft13 in England and Wales, or sections 247C, 247D, and 247G of the Crimes Act 1958

in Victoria but, critically, no known civil wrong upon which a property claim could be brought

by a user. Conversion is not available for intangibles;14 the proper claimant being she with a

better right to possession than the defendant, which limits the action to “property which is

susceptible of possession itself, which pure incorporeals are not.” 15 The possibility of

recovering at least damages in the case of paper, hardware, or even mobile or desktop wallets,

but nothing in the case of web wallets is plainly undesirable for legal consistency and a

functional property law taxonomy, even if, commercially, little sympathy is shown for those

who opt for hot storage.

12 Fouldes v Willoughby (1841) 81 M & W 540, 550. Emphasis added. 13 As was the prosecution’s case in R v West, Southwark Crown Court, 14 December 2017. See more at the Crown Prosecution Service News Centre, ‘Prolific Computer Hacker Jailed for 10 Years’ (25 May 2018) < https://www.cps.gov.uk/cps-london-north-london-south/news/prolific-computer-hacker-jailed-10-years > accessed 29 August 2018. 14 OBG Ltd v Allan [2007] UKHL 21; [2008] 1 AC 1. 15 D Nolan and J Davies, ‘Torts and Equitable Wrongs’ in A Burrows (ed), English Private Law’ (3rd ed, OUP 2013), [17.311] fn 609.

58

The arbitrary distinction fixed by tangible form is thrown into even sharper relief in the context

of remedies. In the case of paper, hardware, and mobile/desktop wallets, under the Torts

(Interference with Goods) Act 1977, users would have an option between specific delivery of

the chattel upon which the private key had been stored, or the alternative of damages by

reference to the value of the goods.16 Were, however, the paper, hardware device, mobile

phone, or laptop, made subject to an order of specific delivery, to what extent could it be said

that a user’s rights as owner had been vindicated? The remedy does not prevent the

defendant from retaining copies made prior to the order; continuing to access transaction

inputs sent to the user’s public address and signing spends for them using these copies.

Furthermore, if the user had elected damages, should the defendant be ordered to pay based

on the quantum of value currently17 associated with the user’s public address at the prevailing

BTC/GBP or ETH/USD price (currently £3,969.32 and $156.68), or the value of the paper

(typically worthless), Trezor T or Ledger Nano S (currently retailing at £149 and £54.50

respectively on amazon.uk), or Samsung Galaxy S10 or MacBookPro (£899 and £1,449 minus

any appropriate deduction)? Although solace may be found in the practical sense of the

common law in conversion cases involving documentary intangibles treated as chattels, which

uniformly assessed damages as the value of the underlying right or obligation,18 it has also

been noted that there are limits to extending conversion to intangible property. In particular,

“there is a judicial reluctance to extend the tort by deeming documents copying intangible

information to be treated as belonging to the claimant for the purpose of a conversion action.”19

Although, therefore, it may, in theory, be possible to extend Professor Goode’s category of

documentary intangibles to crypto assets and apply a property analysis by reference to the

kind of wallet used, the difficulties encountered and undesirable consequences arising with

the arbitrary distinction between physical and non-physical methods of storage are too

significant for the proposal to be considered a truly viable solution. In short, the form or method

of recording what is still the same substantive asset should not render ownership rights

precarious.

16 Torts (Interference with Goods) Act 1977, ss 3(2)(b), 3(3). 17 All prices as at 15 April 2019. 18 M Bridge et al (eds), The Law of Personal Property (2nd ed, Sweet and Maxwell 2018), [32-034] fn 249, fn 253 and text. 19 Ibid, [32-034] fn 259 and text.

59

4.1.1.2 Private Keys as Intellectual Property20

An alternative approach is to analyse the private key substantively as a large and unique

number used to sign cryptographic messages. If the right to use the private key in

broadcasting proposed changes in state to the blockchain network is emphasised, ownership

rights in such assets are not vindicated through locus standi to compel performance of the

obligation (the ‘chose in action’ method used for the simple contract debt); nor by simply

‘obtaining possession’ of the private key as personal property (the ‘chose in possession’

method used for bearer negotiable instruments and, presumably, also the ‘virtual chose in

possession’ proposed by the FMLC). Rather, the value and ownership over a private key is

vindicated, not on any bilateral level,21 but by injunctive relief against all the world in preventing

others from knowing, or even if known, using the number.

This distinction between use and knowledge on the one hand, and other notions of ownership,

such as possession or control on the other is subtle, yet its importance is highlighted if one

considers the situation of copies of private keys being taken, preserved, and used without the

rightful owner’s authorisation. This was recognised by Lord Radcliffe in Rolls Royce in respect

of the appellant’s valuable ‘know-how’:

…it would be wrong to confuse the physical records with the “know-how” itself,

which is the valuable asset: for, if you put them on a duplicator and produce one

hundred copies, you have certainly not multiplied your asset in proportion. Again,

as the facts of the present appeal show, “know-how” has the peculiar quality that

it can be communicated to or shared with others outside the manufacturer's own

business, without in any sense destroying its value to him. It becomes, if you like,

diluted, and its value to him may be affected.22

Unlike know-how, however, private keys have a one-time use, in the sense that any message

cryptographically signed with the digital signature derived from the private key will irrevocably

20 Approximately 130 words were taken from a past paper ‘Bitcoins, Blockchains, and Decentralised Ledgers: Does Situs Actually Matter? (LL.M Dissertation, City Law School, City, University of London, September 2018). 21 P Paech, The Governance of Blockchain Financial Networks’ (LSE Legal Studies Working Paper No 16/2017 2017), 39 < https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2875487 > accessed 18 December 2017. 22 Rolls Royce (n 6), 430 (Lord Radcliffe).

60

propagate a proposed a change in state across the network. On the other hand, as with the

reference by Lord Radcliffe to patents above, it is clear that private keys are substantively

related to intellectual property (‘IP’): rights in the use of an abstract concept, which may be

realised in an unlimited number of manifestations, both physical and digital, and are protected

– not ‘enforced’ – by restricting all the world from realising the concept.

IP rights are typically register-based and, in theory, there is no reason why a register could

not guarantee ownership of private keys by registering keys pairs and/or addresses with legal

persons off-chain. Such an approach has been already adopted in the EU in the context of

financial crime through the fifth iteration of the Anti-Money Laundering Directive (‘AMLD V’)23

which has brought “virtual currencies”24 within the scope of the Directive (currently AMLD IV)25

by including “providers engaged in exchange services between virtual currencies and fiat

currencies” and “custodian wallet providers” 26 within the list of ‘obliged entities.’ 27 The

rationale for doing so is set out in Recital 9 of AMLD V:

The anonymity of virtual currencies allows their potential misuse for criminal

purposes. The inclusion of providers engaged in exchange services between

virtual currencies and fiat currencies and custodian wallet providers will not entirely

address the issue of anonymity attached to virtual currency transactions, as a large

part of the virtual currency environment will remain anonymous because users can

also transact without such providers. To combat the risks related to the anonymity,

national Financial Intelligence Units (FIUs) should be able to obtain information

23 Directive (EU) 2018/843 of the European Parliament and of the Council of 30 May 2018 amending Directive (EU) 2015/849 on the prevention of the use of the financial system for the purposes of money laundering or terrorist financing, and amending Directives 2009/138/EC and 2013/36/EU [2018] OJ L 156/43 (‘AMLD V’). 24 Art 1(2)(d) amends Art 3 of Directive (EU) 2015/849 to add: “the following points are added: ‘(18) “virtual currencies” means a digital representation of value that is not issued or guaranteed by a central bank or a public authority, is not necessarily attached to a legally established currency and does not possess a legal status of currency or money, but is accepted by natural or legal persons as a means of exchange and which can be transferred, stored and traded electronically.” 25 Directive (EU) 2015/849 of the European Parliament and of the Council of 20 May 2015 on the prevention of the use of the financial system for the purposes of money laundering or terrorist financing, amending Regulation (EU) No 648/2012 of the European Parliament and of the Council and repealing Directive 2005/60/EC of the European Parliament and of the Council and Commission Directive 2006/70/EC [2015] OJ L 141/73. 26 Defined in Art 1(2)(d) by inserting the following to the definitions at Art 3(19) “custodian wallet provider” means an entity that provides services to safeguard private cryptographic keys on behalf of its customers, to hold, store and transfer virtual currencies.’ 27 Article 1(1)(c) amends Art 2(1) and includes under ‘obliged entities’: “(g) providers engaged in exchange services between virtual currencies and fiat currencies; (h) custodian wallet providers.”

61

allowing them to associate virtual currency addresses to the identity of the owner

of virtual currency. In addition, the possibility to allow users to self-declare to

designated authorities on a voluntary basis should be further assessed.28

Similarly, the objects of the Australian Anti-Money Laundering and Counter Terrorism

Financing Act 2006 include: to provide measures to detect, deter and disrupt money

laundering, the financing of terrorism, and other serious financial crimes;29 and to provide

relevant Australian government bodies and their international counterparts with the

information they need to investigate and prosecute money laundering offences, offences

constituted by the financing of terrorism, and other serious crimes.30 In 2018, the Act was

amended to bring digital currency providers within the list of “designated services” for the

purposes of that Act,31 with digital currency defined as:

(a) a digital representation of value that:

(i) functions as a medium of exchange, a store of economic value, or a unit of

account; and

(ii) is not issued by or under the authority of a government body; and

(iii) is interchangeable with money (including through the crediting of an

account) and may be used as consideration for the supply of goods or

services; and

(iv) is generally available to members of the public without any restriction on its

use as consideration; or

(b) a means of exchange or digital process or crediting declared to be digital

currency by the AML/CTF Rules.32

Whilst such provisions and reporting requirements may be invaluable for long-term financial

crime prevention, in the simpler context of civil property rights, the pace at which individual

transactions occur would likely render such identity registers ineffective. By the time a private

key is stolen, the relevant register alerted, and an action brought to protect the right, it would

28 AMLD V (n 23), Recital 9. 29 Part 1, s 3(1)(aa) Anti-Money Laundering and Counter Terrorism Financing Act 2006 (Cth). 30 Part 1, s 3(1)(ab) Anti-Money Laundering and Counter Terrorism Financing Act 2006 (Cth). 31 Part 1, s 6, Item 50A, Anti-Money Laundering and Counter Terrorism Financing Act 2006 (Cth). 32 Part 1, s 5, Anti-Money Laundering and Counter Terrorism Financing Act 2006 (Cth).

62

likely be too late. The other practical difficulty with a register linking key pairs to legal persons

off-chain, at least in unpermissioned networks such as Bitcoin, is the resistance likely to be

met by the relevant crypto asset community and the pseudo-anonymous nature of participation

in the network as a whole. Short of a court order in individual circumstances compelling a

legal person to disclose his or her key pair,33 it is unlikely that in unpermissioned networks that

registers of key pairs will be readily implemented.

A variation of a register linking private keys to legal persons is to maintain a ‘blacklist’ of crypto

assets which have been reported as tainted by criminal activity. In respect of Bitcoin, such a

register was previously maintained;34 similarly, Professor Anderson et al of the Cambridge

Computer Laboratory report that the Bitcrime project recommended in January 2017 that

Europol should maintain a public blacklist for Europe, albeit, only in respect of ‘coin crimes’ for

which a court had made a final determination.35

4.1.1.3. Private Keys as ID Credentials

Another possibility is to analyse private keys in the terms of their use within the wider

blockchain network. Here, it is worth noting that, notwithstanding the emphasis on knowledge

of the private key as the root of user control in enjoying the benefit of a crypto asset, there are

at least three reasons why crypto assets and private keys should be considered distinct.

First, if Alice transfers 1 Bitcoin to Bob, although she is unable to do so without her private key

and loss of the key means loss of 1 Bitcoin, it is not this key itself which is transferred to Bob.

Were the private key equivalent to the Bitcoin, the only method of transfer would be to hand

over the wallet itself, whether paper, Trezor, or simply giving knowledge of the key to the

intended transferee by reading out a long string of letters and numbers.

33 As was reportedly ordered by the Southern District Court of Florida against Craig Wright in respect of Bitcoin addresses held as at 31 December 2013 in an on-going civil dispute with a former business partner. As reported by Y Kharti, ‘Craig Wright Ordered to Disclose Bitcoin Addresses in Kleiman Court Case,’ (Coindesk, 6 May 2019) < https://www.coindesk.com/craig-wright-ordered-to-disclose-bitcoin-addresses-in-kleiman-court-case > last accessed 2 June 2019. 34 R Anderson et al, ‘Bitcoin Redux’ (28 May 2018), [3] <https://weis2018.econinfosec.org/wcontent/uploads/sites/5/2018/05/WEIS_2018_paper_38.pdfblockchain.info > accessed 17 September 2018. 35 Anderson et al (n 34), 11.

63

Second, from a coding perspective, a successful transfer of Bitcoin does not transfer the

UTXO associated with the transferor’s key pair; the transfer simply creates a link between the

transferor’s public address and the transferee’s public address. In the words of Professor

David Fox:

The coin is only a notional entity, a convenient way of imagining the BTC value

represented by the output associated with a public key. The coin representing the

input to the transaction at pkA is destroyed and replaced by another coin

representing the transaction output at pkB. We would not imagine the data string

representing the coin at pkA as being transferred to pk B. The data strings at each

public key, before and after the transaction are distinct. We can, however, identify

one with the other because of the recorded transactional link between them, going

back to a specific mining transaction.36

Third, although the private key is essential to control over UTXO, the specific quantum of value

it unlocks remains premised on a broader system of validation and consensus by the

blockchain network.

Hence, the proposition explicated at the outset of this Part: the difficulty in determining the

legal significance to be ascribed to each of the private key and the blockchain to underpin a

rational system of legal property in crypto assets.

Returning to the basic proposition that Bitcoin is a novel method of clearing payment

instructions immediately demonstrates that the private key is a type of ID credential used

within the relevant crypto network to validate a payment mandate. This simple fact may be

obscured due to the growing commercial recognition that the context in which a private key is

used renders it a valuable asset in its own right: the subject of demand in a recognised market,

the target of theft, the subject of insurance37 and custody services. One of the broader issues

is, therefore, not strictly one limited to crypto assets and DLT but reflects a wider socio-

economic shift. If, from the 18th century, obligations to pay money increasingly gained social

importance as the capital-based economy began to supplant land as the dominant source of

36 D Fox, ‘Cryptocurrencies in the Common Law of Property’ in D Fox and S Green (eds) Cryptocurrencies in Private and Public Law (OUP 2019), [6.18]. 37 See for example Lloyd’s of London, ‘Bitcoin: Risk Factors for Insurance’ (Lloyd’s Emerging Risk Report 2015) <www.lloyds.com> accessed 7 August 2018.

64

wealth, it is arguable that in the 21st century, digital proofs of identity are increasingly treated

as valuable – and socially significant – assets in their own right. It is worth noting that terms

such as ‘identity theft’ have been long used in popular parlance, and the flourishing markets

for custody and insurance for private keys demonstrates the extent to which mercantile

practice recognises a password – at least in the crypto asset sphere – as a valuable economic

asset.

Further discussion of whether ID credentials meet the common law definition of property is

beyond the scope of this paper; for present purposes, it suffices to note that identity

credentials, however valuable in their own right, cannot be equated with the asset to which

they grant access. Just as a bankcard PIN is not the same asset as the bank credit to which

it grants access, the private key cannot be taken to be the crypto asset itself. The question

remains, thus, what a valuable private key grants access to and the legal weight or significance

it assumes in this broader analysis. Within the wider operation of the network, what legal

significance does a message proposing a change in state duly signed by a private key

assume?

4.1.1.4. Other Possibilities38

Professor Ross Anderson et al have suggested that a solution could be developed by

reference to the EU Payment Services Directive,39 under which instructions by a user to a

payment services provider to initiate a payment are not necessarily conclusive in law. Article

72(1) of the Payment Services Directive (‘PSD 2’) provides that:

Where a payment service user denies having authorised an executed payment

transaction, the use of a payment instrument recorded by the payment service

provider, including the payment initiation service provider as appropriate, shall in

itself not necessarily be sufficient to prove either that the payment transaction was

38 Approximately 400 words (the section on Partnerships) was taken from a past paper ‘Bitcoins, Blockchains, and Decentralised Ledgers: Does Situs Actually Matter? (LL.M Dissertation, City Law School, City, University of London, September 2018). 39 Directive 2015/2366/EU of the European Parliament and of the Council of 25 November 2015 on payment services in the internal market, amending Directives 2002/65/EC, 2009/110/EC and 2013/36/EU and Regulation (EU) No 1093/2010, and repealing Directive 2007/64/EC [2015] OJ L 337/35 Art 72(2) (‘PSD2’).

65

authorised by the payer or that the payer acted fraudulently or failed with intent or

gross negligence to fulfil one or more of the obligations under Article 69. The

payment service provider, including, where appropriate, the payment initiation

service provider, shall provide supporting evidence to prove fraud or gross

negligence on part of the payment service user. 40

The authors therefore conclude that,

A legislature that made cryptography constitutive of ownership would violate a

number of established rights and principles […] It would exclude, or at least make

more complex, legal reasoning about intent, agency, liability and other issues that

have already been discussed in the context of the law on digital signatures.

Probably the most that might reasonably be done is to treat the signature as a

rebuttable presumption of ownership, following the electronic signature directive.

However that had such adverse effects on liability that qualified electronic

signatures found only very limited use. Here, we merely flag up such issues as

needing clarification.41

The proposal of a rebuttable presumption of ownership or authenticity of mandates is certainly

worth consideration. Even if, however, mining can be considered simply a form of clearing

and the blockchain the definitive record of settled transfers, this precedent will be of limited

application as its usefulness will depend on whether the network is open or closed. Closed or

permissioned contexts, especially where mining is a privileged activity undertaken by the

operator or operator’s agents alone is considered at Part 4.4.2 below. Open or

unpermissioned networks, however, are more problematic, given that mining is a voluntary

activity open to all; the network of nodes cannot be said to be a defined entity providing

clearing and settlement services which has any interest in rebutting a presumption under Art

71(2) of the PSD 2, if it can even be said to attract legal liability to users at all.

On an ideological level, the concept of enforceable user rights against an unpermissioned

mining community is incongruous in systems designed to implement an ideal of decentralised

trust. In theory, the interests of users and miners are designed to be so aligned and the

40 PSD2 (n 39), Art 72(2). 41 Anderson et al (n 34), 24-25.

66

mathematics underpinning the cryptography so precise that there should be no need for

recourse to the law to protect legitimate expectations or, even worse, any scope to imply duties

of care between participants beyond the mathematics of the system. True decentralisation of

trust, thus, comes at a heavy price to the individual:

A centralized model, such as a traditional bank or payment network, depends on

access control and vetting to keep bad actors out of the system. By comparison,

a decentralized system like Bitcoin pushes the responsibility and control to the

users.42

And again:

With control comes a big responsibility. If you lose your private keys, you lose

access to your funds and contracts. No one can help you regain access—your

funds will be locked forever.43

In short, in decentralised systems, the price paid for equality in knowledge of the definitive

ledger amongst participants is individual responsibility. There seems to be no ideological basis

upon which a user could hold the mining community responsible for his or own failure to keep

his private keys safe, even if he were a wholly innocent victim of theft or fraud; it is arguable

that parties who participate in such networks implicitly agree that the code is the law and to

abide by the immutability of the resulting blockchain. User entitlements seem further

incongruous in a system where there is no obligation on miners to effect ‘clearing and

settlement services’ at all. In the words of Assistant Professor Angela Walch:

A decentralized structure creates the risks that no one will even attempt to ensure

that Bitcoin works; that even if someone does step up to help, he or she has no

official authority […] it will be difficult to tell who should be involved in the process

because the Bitcoin community is so fluid. With existing centralized financial

market infrastructure, it is at least clear who has the responsibility to manage and

repair it, and it is possible to impose risk management obligations on someone…44

42 Antonopoulos (n 4), 269. 43 A Antonopoulous and G Wood, Mastering Ethereum (O’Reilly Media 2019), 16. 44 A Walch, ‘The Bitcoin Blockchain as Financial Market Infrastructure: a Consideration of Operational Risk,’ (2015) 18(837) Legislation and Public Policy, 872-7.

67

Bitcoin’s status as open-source software means that everyone interested may

participate […] but, crucially, that no one must do so.45

Similarly, it is often assumed that the de facto immutability of a decentralised ledger or the

unpermissioned context ‘prevents lawful interventions’ 46 in the operation of the system.

However, such a position is, with respect, naïve. The real question for the law is whether such

normative facts should be overridden by the law to impute responsibilities to those who fall

within its jurisdiction. A duty of care might be imposed upon miners to verify or later rectify the

blockchain where transactions have been propagated as a result of theft. However, as a

matter of commercial law, with its attitude of caveat emptor, and the foresight requirements

imposed by the law of torts, implied duties on miners do not seem appropriate when users

have been adequately warned to keep their private keys safe and secure from the possibility

of theft. On the other hand, such a position may be overcome as a matter of policy in the

same way that the harshness of caveat emptor has been mitigated by statutory protections.47

A distinction may be drawn with cases of theft by means of fraud on the blockchain itself.

Here, there is some scope to imply obligations between users and miners following orthodox

legal principles, given that all transaction instructions include a transaction fee to be

transferred to the winning miner. This is ‘paid’ in advance by the user when constructing its

signed transaction and is included on the winning candidate block as the coinbase transaction.

Hence, there is clear potential for a contractual relationship between users and the winning

miner on whose candidate block the relevant transactions are included: mining services in

consideration of a transaction fee denominated in BTC or Gas.

This, however, paints only a partial picture of the commercial transaction. First, although no

consideration is exchanged with the rest of the mining network, it performs the necessary

verification with respect to the winning candidate block to ensure its validity, and the indirect

voting necessary to ensure that the candidate block remains a valid ‘parent’ the blockchain.

If, therefore, the winning miner proved to be fraudulent, to what extent would it be possible to

separate liability between this miner and the rest of the mining network which propagated,

45 Walch (n 44), 876. 46 Oliver Wyman and Euroclear, ‘Blockchain in Capital Markets: The Prize and the Journey’ (February 2016), 14 < https://www.oliverwyman.com/content/dam/oliver-wyman/global/en/2016/feb/BlockChain-In-Capital-Markets.pdf > accessed 29 July 2018. 47 Such as the Unfair Contract Terms Act 1977.

68

verified, and validated his candidate block? Given that a majority of miners would be required

to validate the blockchain or successfully propagate fraud on the blockchain, it seems

unrealistic to apportion liability to a single miner.

A speculative response to these issues may be conceiving of the miners as operating in a

partnership. After all, users do not address offers of a transaction fee to any miner in particular

but the entire mining network, which participates as a whole to effect the mining service in

exchange. Partnership concepts of joint liability48 and fiduciary duties49 are, further, strikingly

appropriate to the ideological underpinnings of the blockchain as a peer-to-peer system of

trust. If this characterisation is accepted, the first key question would then be whether the

mining network can be said to fall within the definition of partnership as “the relation which

subsists between persons carrying on a business in common with a view of profit.”50 For

present purposes, it suffices to note that there is nothing in the decided cases 51 which

precludes the recognition of a partnership which carries on mining activities on the basis that

partnership profits (transaction fees and new Bitcoins) will be allocated according to internal

rules (the proof of work competition).52

Taking this concept one step further, a further alternative may be to consider the network of

nodes as a whole as representing a collective undertaking or agreement, such as a collective

investment scheme, joint venture, private investment fund, company, or unincorporated

association. Although each captures the concept of participation in a collective, the formal

difficulties in respect of the former vehicles arguably renders the unincorporated association

the most appropriate characterisation for an unpermissioned blockchain network.

Unincorporated associations have a long history in English law and remain the basis from

which the now-formalised vehicles for collective participation, such as companies and

partnerships, developed. 53 During the 17th century, when incorporation was originally by grant

48 Partnerships Act 1890 s 9 (UK); Partnership Act 1958 s 13 (Vic). 49 See generally M Blackett-Ord and S Haren Partnership Law (5th ed, Bloomsbury Professional 2015) Ch 11. 50 Partnerships Act 1890 s 1(1) (UK); Partnership Act 1959 s 5(1) (Vic). 51 See further Blackett-Ord and Haren (n 49), [2.15]-[2.39]. 52 Approximately 400 words (on contract and partnerships) were taken from a past paper, ‘Bitcoins, Blockchains, and Decentralised Ledgers: Does Situs Actually Matter? (LL.M Dissertation, City Law School, City, University of London, September 2018). 53 For a general history of the development of English company law from the ‘nexus of contracts’ which characterise unincorporated associations, see L Talbot, ‘Enumerating Old Themes? Berle’s

69

of royal charter, incorporated form did not necessarily differ much in practice from

unincorporated form.54 Businesses often operated as a ‘nexus of contracts’ and informal

understandings – that is, as an unincorporated association – within the broader aegis of a

single corporate entity. 55 Whereas company law has since developed, unincorporated

associations remain without legal personality, and have been authoritatively defined in

Conservative and Unionist Central Office v Burrell as:

Two or more persons bound together for one or more common purposes, not being

business purposes, by mutual undertakings each having mutual duties and

obligations, in an organisation which has rules which identify in whom control of it

and its funds rests and on what terms and which can be joined or left at will. 56

Unincorporated associations, thus, are ‘creatures of contract’; modern authority continues to

hold that the rules of the association are impliedly binding upon members as a matter of

ordinary contract law.57

Applied to Bitcoin, the following observations are made. First, although many Bitcoin users

typically use them for business purposes, this does not preclude the finding of an

unincorporated association because the Bitcoin network or community itself does not promote

a business purpose; rather, the common purpose appears more to be rooted in the ideology

of ‘doing things differently’ using cryptography and decentralised consensus algorithms. Thus,

the common purpose amongst users would be to agree that 21 million Bitcoin can be used an

alternative to central bank money, values of which are defined as UTXO distributed across

addresses in the network, settled according to the proof of work consensus algorithm, with

changes in the distribution definitively recorded on the blockchain. Second, these rules are

clearly stated in the Bitcoin White Paper. Third, mutual duties and obligations can be said to

arise in the collective task of verifying transactions. It is submitted, therefore, that

Concept of Ownership and the Historical Development of English Company Law in Context’ [2010] 33(4) Seattle U L Rev 1201, Part II at 1203 et seq. 54 Talbot (n 53), 1203-04. 55 Talbot (n 53), 1204. 56 [1981] EWCA Civ 2, [1982] WLR 522, [2] (Lawton LJ). 57 Most recently considered by reference to the authorities and confirmed in Speechley v Allott [2014] EWCA Civ 230. In Hardy v Hoade [2017] EWHC 2476 (Ch), the court held that the rules of a club, like any other contract, fell to be construed in accordance with the principles summarised in Arnold v Britton [2015] UKSC 36, [2015] AC 1619, [2015] 6 WLUK 320.

70

unpermissioned networks are best characterised as a novel type of unincorporated

association.

If this is accepted, the concept of a unit or share in the more formal collective investment

scheme or company can be usefully adapted and applied to refine the property analysis.

Obviously, the network does not ‘own’ extrinsic property in the same way that an alternative

investment fund owns a portfolio of assets and holds it on behalf of its fund participants and it

is not suggested that it is appropriate to import wholesale the terminology of ‘units’ or ‘shares’

into a proposed characterisation of an unpermissioned network as a kind of unincorporated

association. However, the concept is useful from a property perspective. By parallel, crypto

assets can be considered a quantum of participation or value determined by the rules of

consensus used by the relevant blockchain ‘association.’ Within this context, knowledge of the

private key could be considered definitive of the legal interest of possession, that is, the right

to control and exercise the property incident of transferability and enjoy the benefit of use, in

respect of this right to be recognised as participating in the network with a defined quantum of

value.

Notwithstanding the theoretical legal possibilities, the primary difficulty with developing a

functional system of property in respect of unpermissioned networks lies in practical

implementation. The blockchain can only ascribe value to particular public addresses; it does

not identify who is entitled to the benefit of that value and determine the manner in which it will

be spent. In the absence of an identity register or blacklist of tainted coins maintained off-

chain, any duties imputed to participants would be difficult, if not impossible, to enforce. In

this regard, Corda, with its hybrid model and objective of legal enforceability, represents the

most promising model. On the other hand, the issue raises more fundamental ideological

questions of the role of law in truly decentralised networks. For the more utopian advocates

of cryptography, the law itself is simply another form of centralised trust which may ultimately

become unnecessary in a society governed by lex cryptographia.58

58 See, for example, A Wright and P Filippi, ‘Decentralised Blockchain Technology and the Rise of Lex Cryptographia’ (2015) < http://ssrn.com/abstract=2580664 > accessed 19 December 2017.

71

4.1.2. Exchanges

Notwithstanding these difficulties, clarity in the legal characterisation of a crypto asset and its

constituent parts is desirable not only for legal certainty in itself, but because, in practice, most

users do not hold private keys directly but instead use ‘hosted’ or ‘custodial’ wallets. These

operate in such a way that a derivative property interest in crypto assets, premised upon and

limited by the definition of the basic crypto asset itself, is arguably created.

Hosted wallets are usually provided by crypto asset exchanges, which typically purport to hold

private keys ‘on behalf of the user.’ However, unlike dedicated wallet apps, which offer private

key management, exchange-hosted wallets do not generally transmit signed instructions to

the other nodes in the relevant blockchain network for inclusion on the next block. Rather, they

enable users to transmit buy/sell orders to the exchange itself for execution on the exchange

platform.

Direct interaction with the blockchain is generally understood to be undertaken by the

exchange on behalf of its users, and most exchanges are marketed as keeping private keys

in secure, cold storage vaults to be retrieved to the order of exchange participants. However,

again, as a matter of practice, most industry insiders59 assume that exchanges do not store

private keys nor broadcast signed transactions ‘on behalf of’ exchange participants at all.

Rather, most exchange transactions occur ‘off chain’: exchanges maintain internal records of

transactions between exchange participants, but these are not necessarily transmitted to the

other nodes nor included on the blockchain. If Alice and Bob both hold Ether in hosted wallets

at the same exchange and Alice transfers some to Bob having sent the necessary instruction

to the exchange, it is more likely than not that the transfer will not be broadcast to the

blockchain network; the exchange will simply update its own internal records. No change in

state will occur in respect of the exchange’s public address; it will simply be attributed with the

same amount of Ether as it did before.

Off-chain transactions appear to have become the default between the period 2016-2018,

vindicating the prediction by early pioneers of Bitcoin that off-chain transactions would

59 Anderson et al (n 34),13-14.

72

eventually become the norm.60 The concerns which have consequently arisen61 mirror those

which have long been identified in respect of omnibus securities accounts: the absence of any

requirement that exchanges guard against shortfalls in their internal accounts by maintaining

sufficient balances of crypto assets attributable to their public addresses to cover the sum of

their client entitlements, as recorded in the exchange’s internal accounts. Should any shortfalls

arise, the exchange users’ property rights in ‘their’ crypto assets ‘held in an exchange wallet’

will depend on: (i) the characterisation of the crypto asset itself which the exchange

purportedly holds ‘for’ the user; (ii) the precise contractual agreement between the exchange

and the user; and (iii) the method the exchange itself uses to interact with the relevant network

as a node. Factor (i) having been considered in Part 4.1.1, the remainder of this section

examines the user agreements of two well-known crypto-exchanges, Coinbase and Gemini.

4.1.2.1. Coinbase

In the UK, a user account with Coinbase comprises an Agreement with each of Coinbase UK

Ltd (‘Coinbase UK’) and CB Payments Ltd (‘Coinbase Payments’).62 Coinbase Payments

provides E-Money services in respect of E-Money payments issued by Coinbase Payments,

which are typically purchased with fiat currency in a standard bank transfer.63 Coinbase UK,

on the other hand, provides Digital Currency services, which comprise provision of a hosted

Digital Currency Wallet, which enables users to store, track, transfer, and manage balances

of certain supported Digital Currencies.64 The property considerations arising from Digital

Currency and Digital Currency Wallets can be examined predominantly through three clauses

in the Coinbase User Agreement:

60 Hal Finney is cited as having stated: ‘Bitcoin itself cannot scale to have every single financial transaction in the world be broadcast to everyone and included in the block chain...Most Bitcoin transactions will occur between banks, to settle net transfers. Bitcoin transactions by private individuals will be as rare as...well, as Bitcoin based purchases are today.’ Cited in Anderson et al (n 28),15. 61 Anderson et al (n 34), 13-16. 62 Coinbase User Agreement, Recitals <https://www.coinbase.com/legal/user_agreement > accessed 4 April 2019. 63 Coinbase User Agreement (n 62), Clause 2.1. Coinbase Payments and the provision of its services are regulated by the FCA under the E-Money Directive. 64 A full list of supported digital currencies is available at < https://support.coinbase.com/customer/en/portal/articles/2630943 >.

73

5.1. In General. “Your Digital Currency Wallet enables you to send Digital

Currency to, and request, receive, and store Digital Currency from, third parties by

giving instructions through the Site.” 65

[…]

5.12. Digital Currency Storage & Transmission Delays. The Coinbase Group

securely stores Digital Currency private keys, in a combination of online and offline

storage, which are the means by which you can securely approve a Digital

Currency Transaction. As a result of our security protocols, it may be necessary

for us to retrieve private keys or related information from offline storage in order to

facilitate a Digital Currency Transaction in accordance with your instructions, and

you acknowledge that this may delay the initiation or crediting of such Digital

Currency Transaction.66

[…]

5.16 Digital Currency Title. All Digital Currencies held in your Digital Currency

Wallet are custodial assets held by the Coinbase Group for your benefit. Among

other things, this means:

1. Title to Digital Currency shall at all times remain with you and shall not

transfer to any company in the Coinbase Group. As the owner of Digital

Currency in your Digital Currency Wallet, you shall bear all risk of loss of

such Digital Currency. No company within the Coinbase Group shall have

any liability for fluctuations in the fiat currency value of Digital Currency held

in your Digital Currency Wallet.

2. You control the Digital Currencies held in your Digital Currency Wallet. At

any time, subject to outages, downtime, and other applicable policies, you

may withdraw your Digital Currency by sending it to a different blockchain

address controlled by you or a third party.

65 Coinbase User Agreement (n 62), Clause 5.1. 66 Coinbase User Agreement (n 62), Clause 5.12. Emphasis added.

74

3. In order to more securely custody assets, the Coinbase Group may use

shared blockchain addresses, controlled by a member of the Coinbase

Group, to hold Digital Currencies held on behalf of customers and/or held

on behalf of Coinbase UK. Although we maintain separate ledger

accounting entries for customer and Coinbase Group accounts, no member

of the Coinbase Group shall have any obligation to segregate by blockchain

address Digital Currencies owned by you from Digital Currencies owned by

other customers or by any member of the Coinbase Group (emphases

added).67

Three distinct terms require detailed consideration. Clause 5.12 refers to ‘Digital Currency

private keys’ which “are the means by which [users] can securely approve a Digital Currency

Transaction.” Given that they may need to be retrieved from offline storage in order to facilitate

an instruction to transfer Digital Currencies, they seem relatively uncontroversial as the private

keys which broadcast proposed changes in state to the relevant blockchain network.

There are, however, two different clauses referring to ‘Digital Currencies’ which give rise to

inconsistency as to where such assets are ‘held.’ Clause 5.16 refers to Digital Currencies held

in Digital Currency Wallets, which are stated to be “custodial assets held by the Coinbase

Group for [users’] benefit.” Sub-Clause 5.16.3, however, also refers to Digital Currencies; this

time held on behalf of users by use of “shared blockchain addresses, controlled by a member

of the Coinbase Group,” with a disclaimer of any obligation to “segregate by blockchain

address” ownership of Digital Currencies. Digital Currencies are thus held either in a Digital

Currency Wallet controlled by the user, or at a shared blockchain address controlled by the

Coinbase Group.

The Coinbase User Agreement is one of many surveyed in an informal study68 which does

clarify how digital assets are held and traded vis-a-vis the relevant network; more specifically,

the User Agreement does not disclose whether trades initiated on the Coinbase Exchange are

mirrored by ‘on-chain’ transfers, or whether these trades remain off-chain. Such specifications

would assist in determining what rights users have in respect of Digital Currencies, but in the

67 Coinbase User Agreement (n 62), Clause 5.16. Emphases added. 68 Anderson et al (n 34), 14.

75

absence of any technical specifications, a rudimentary programming analysis suggests that (i)

“blockchain addresses” in Clause 5.16.3 are public addresses derived from the “Digital

Currency private keys” controlled by the Coinbase Group referred to in Clause 5.12; and (ii)

’Digital Currency Wallets’ refers to programs on Coinbase’s own exchange software through

which users connect with Coinbase’s systems. This accords with Clause 5.1, which states

that Digital Currency Wallets enable crypto asset transactions by giving instructions through

the Coinbase Site.

Chapter 2 demonstrated that wallets do not contain crypto assets but private keys. This raises

questions regarding what, then, a Digital Currency Wallet contains, given that users do not

have access to private keys. These were stated as being ‘custodied’ by the Coinbase Group

(Clause 5.12); Digital Currency Wallets only enable users to transmit instructions to Coinbase

(Clause 5.1). This raises further questions as to the economic value users’ ownership rights,

because, as a matter of fact and in programming terms it does not appear that Digital Currency

Wallets hold anything of any value at all. This is obscured by the somewhat unclear drafting

of the Coinbase User Agreement, but if:

(1) the private keys underpinning Digital Currencies which broadcast to the blockchain

networks are held in storage by Coinbase; and

(2) the corresponding public key and addresses are controlled by members of the

Coinbase Group; which

(3) use “shared blockchain addresses” to hold on behalf of users and the Coinbase Group

without any obligation to segregate holdings ‘by blockchain address’;

then it follows that:

(4) Coinbase users do not own, control, or access a private key, nor receive individually

at an individual public address; and

(5) whatever is stored in users’ Digital Currency Wallets does not correspond to anything

recognised as part of the relevant blockchain network.

Hence, the contents of a Digital Currency Wallet are most likely to be, as a matter of fact, a

repository of buy/sell instructions transmitted from such wallets to Coinbase. As a matter of

property law, the most reasonable characterisation seems to be that Digital Currency Wallets

contain the means through which precise value of the user’s claim – if they have one at all –

76

in the shared blockchain address controlled by the Coinbase Group can be determined. These

contents of the Digital Currency Wallet are described in the terms of two different forms

throughout the User Agreement, as Digital Currency held either: (i) by use of a shared

blockchain address controlled by a member of the Coinbase Group (sub-clause 5.16.3); and

(ii) in users’ Digital Currency Wallets (clauses 5.1, 5.16, sub-clause 5.16.2).

That the two forms are used is not necessarily fatal to legal certainty; the issue, rather, appears

to arise from the differing perspectives generated by the use of two software applications: (i)

the relevant crypto network with which Coinbase interacts through its wallet node; and (ii) the

Coinbase software through which the user interacts with Coinbase through the Digital

Currency Wallet. It is reasonably clear that, notwithstanding the use of two forms and terms,

both refer to the same substance of economic value: the user’s rights against Coinbase in

respect of the value associated with the shared blockchain address.

Defining the legal nature of this actual asset with more particularity is, nevertheless, important,

not least because the User Agreement read as a whole gives rise to inconsistency. Clause

5.16 is clearly in terms of property rights: “Title to Digital Currency held in Digital Currency

Wallets shall at all times remain with [users] and shall not transfer to any company in the

Coinbase Group.” Three main legal characterisations are possible for the “Digital Currency

held in Digital Currency Wallets” to which users purportedly have title: (1) it could be no more

than a contractual claim against the Coinbase for the relevant amount of crypto asset;

alternatively, (2) it could be a reference to the “separate ledger accounting entries” referred to

in Sub-clause 5.16.3 which the Coinbase Group maintains in respect of its shared blockchain

addresses as a kind of definitive title register; or further in the alternative, (3) it could be a

beneficial interest in the shared blockchain address.

The use of the phrase “custodial assets held by the Coinbase Group for users’ benefit” and

repeated references to “held for” and “on behalf of” strongly suggests a trustee-beneficiary

relationship rather than a claim in contract. This would not be surprising, given that custodians

of book-entry securities have generally always been presumed, in the absence until very

recently of direct authority on the point, to hold securities on behalf of custody clients as a

trustee. Given that users hold a share in the value ascribed to a public address and controlled

by a member of the Coinbase Group via the private key, it seems intuitive that the relationship

is one of trustee-beneficiary.

77

On the other hand, certain terms of the User Agreement are inconsistent with the existence of

a trust. First, title to trust property remains vested in the trustee; beneficiaries have no ‘title’

to trust property, notwithstanding common usage of that term to denote equitable interests

which are enforced against the trustee which are effective against third parties.69 Second,

beneficiaries have no rights of direct control over trust property which would enable users to

control Digital Currencies freely by withdrawal or transferring to other blockchain addresses

(sub-clause 5.16.2). Dispositions of trust property must be made through the trustee, even in

cases of nomineeship where the only obligation of the trustee is to hold trust property ‘to the

order’ of the beneficiaries.70 At most, a beneficiary can assign his equitable interest or declare

a sub-trust of his interest for his intended transferee. Finally, beneficiaries do not bear the risk

of loss in respect of property impressed with trust as users do in respect of their Digital Assets

(sub-clause 5.16.1). Trustees owe obligations to beneficiaries to preserve trust property;

failure to do so, both through positive acts, such as mis-management of trust assets, and

omissions, such as failing to keep trust property insured, will incur liability in account. If proved,

the trustee will be obliged personally to restore the value of the trust property.71

It is submitted that, if a trust characterisation is preferred, the only way to reconcile these

seemingly inconsistent provisions is to take the step of reifying a trust interest – essentially a

set of obligations against a trustee – in the same way that debts – essentially an obligation in

contract – became a freely transferrable and negotiable asset which a person could be said

to ‘own’, or to have ‘title.’ Again, using the example of financial instruments, an investor,

although he owns his financial asset vis-à-vis other traders, has no more than a claim in

contract vis-à-vis the issuer. Property, given the present emphasis on transferability, does not

necessarily always mean proprietary rights vis-à-vis the original obligor; ‘title’ may well be used

69 W Swadling, ‘Property’ in A Burrows (ed), Oxford Principles of English Law: Private Law (3rd ed, OUP 2017), [4.179]: “The fact that the beneficiary has no rights of enforcement of the trust right against third parties is often obscured by the language used by judges and commentators in this area. It is, eg, common to talk of a trustee of a title to goods as having a ‘legal’ title, and his beneficiary having an ‘equitable’ title. But there is only one ‘title’, where that word means a right to exclusive possession. Although the beneficiary has rights, has an entitlement, his rights are of a different order and therefore not appropriate described in such terms.” 70 E.g., Vandervell v IRC [1967] 2 AC 291 (HL); [1967] 2 WLR 87 concerned a bare trust under which the settlor wished to divest himself of all benefit to the trust property. 71 This comprises the beneficiaries’ right to hold the trustee liable for their management of trust 39-assets. ‘Falsification’ involves disputing a transaction made in breach and the trustee is liable to reverse the effect of the transaction by restoring the fund. ‘Surcharging’ involves breach by omission, such as failing to insure trust property or failing to make a proper investment, which results in a reduction of the value of the trust property. Trustees will be liable to pay the balance of what the fund ought to have been but for the omission. See further L Tucker et al (eds), Lewin on Trusts (19th ed, 2015, Sweet and Maxwell), Chapter 39 generally and [39-003]-[39-004] in particular.

78

in the sense that the underlying obligation is freely transferrable on the secondary markets in

the way prescribed by Sub-Clause 5.16.1.

The alternative legal analysis that users retain title as a bailor of Digital Currencies, which are

bailed to Coinbase as bailee: bailors retain title over bailed goods throughout the term of the

bailment, whereas the bailee obtains only legal possession. The main obstacle, however, to

the recognition of a bailment of Digital Currencies in England and Wales is the centrality of

possession to the legal mechanism of bailment. Noting the etymological root from the French

bailler ‘to deliver,’ Professor Norman Palmer has written that “the essence of bailment is

possession,”72 thus, “unless one person is in possession of goods to which another has a

superior right of possession there can be no bailment.”73 Only legal interests, therefore, may

be the subject of bailment, unless an equitable interest draws with it a right to the immediate

possession of the property.74 Hence, the common law position that intangibles cannot be the

subject of possession and, so, nor can they be the subject of bailment; nor other possession-

based legal techniques.75 It does not seem currently possible, therefore, to characterise

Digital Currencies as being bailed to Coinbase under English law, however, this orthodoxy will

be considered in more depth and ultimately challenged at Part 5.1.

For present purposes, it suffices to note that the terms of the Coinbase User Agreement are,

under current law, inconsistent with the existence of both a bailment and a trust. However,

even if these difficulties could be overcome, a final obstacle presents in the segregation

requirement common to both trusts and bailment. Prima facie, the fact that private keys are

simply large numbers designed to be random to cryptographic standards is striking in this

context because, as such, private keys cannot be said to be in any way fungible.76 As truly

unique assets, the problems of segregation which have arisen with purported bailments and

72 NE Palmer, Palmer on Bailment (3rd ed, Sweet and Maxwell 2009), [1-001]. 73 NE Palmer, ‘Bailment’ in A Burrows (ed) Oxford Principles of English Law: Private Law (3rd ed, OUP 2017), [16.06]. 74 Palmer (n 73), [16.05] fn 40, 41, 42 and text. These principles are reinforced by a “strong judicial conviction that intangible things cannot be converted,” in Palmer (n 72), [30-004]. 75 Approximately 100 words here were taken from a past paper ‘Intermediation, Custody, and the Law of Trusts: Did English Law Cope with the Lehman Insolvency?’ (LL.M Research Paper, Commercial Law: Issues and Policies, Melbourne Law School, December 2017). 76 It is worth noting that a fungible token, such as an ERC20 which considered ‘fungible’ because it does not show the token’s full transaction history, may not necessarily be fungible as a matter of legal property if the analysis remains that it is the private key that is properly the subject of the legal analysis. Although the token may be fungible within its intended sphere of utility, the private key to which the token is attributed will still remain a large and unique number generated to cryptographic standards of randomness.

79

trusts over commingled fungible goods – bars of gold,77 bottles of wine,78 share certificates,79

and book-entry securities80 – on the basis that it is impossible to tell which fungible goods

belong to whom simply do not arise.

On the other hand, even if key pairs, being derived from unique private keys are uniquely

identifiable, it remains open whether bailments and trust require each beneficiary or bailor to

be able to identify which non-fungible asset belongs to them at all times, or whether it is

sufficient that the total number of non-fungible assets held by a common bailee or trustee

matches the total number of claims so that, if necessary, allocation can be made ex-post.

There is little guidance in the authorities, which have concerned fungible assets. However,

that proprietary rights may be recognised over unascertained property by means of a floating

charge81 or over future property82 is certainly indicative that such ex-post allocation would be,

in principle, in accordance with doctrine. Potential methods, should the equivalent of

crystallisation arise in respect of private keys, could be to allocate by reference to time of

‘acquisition’ by a user as recorded on the blockchain, or a ‘first-in, first out’ method currently

used for tracing funds standing to the credit of a bank account.

Notwithstanding this potential for doctrinal development through adapting to a novel form of

property, the effect of the express disclaimer by Coinbase of any obligation to segregate “by

blockchain address” is indicative that the property in question is a single, or certainly minimal

number of, private keys and their associated value, of which users own a proportion; not a

mass or multitude of non-fungible, unique key pairs which simply need to be allocated to

specific users on a ‘one-key-per-user’ basis. That assets are not segregated is, under current

doctrine,83 no bar to the recognition of a trust. The main consideration for assessing the

strength of property rights in Digital Currencies held with Coinbase question would be,

therefore, ensuring that the current value attributed by the relevant blockchain to the shared

address corresponds with the aggregate value of entitlements recorded in the internal ledgers

77 Re Goldcorp Exchange [1995] 1 AC 74. 78 Re London Wine Company (Shippers) Limited [1986] PCC 12. 79 Hunter v Moss [1994] 1 WLR 452 (CA); 3 All ER 215 (CA); [1993] 1 WLR 934 (Ch). 80 Re Lehman Brothers International (Europe), also known as Pearson v Lehman Brothers Finance SA (RASCALS) [2010] EWHC 2914 (Ch); Re Lehman Brothers International (Europe), also known as Lomas v RAB Market Cycles (Master) Fund Ltd [2009] EWHC 2545 (Ch). 81 Agnew v Commissioners of Inland Revenue, also known as Re Brumark Investments Ltd [2001] UKPC 28. 82 Tailby v Official Receiver (1888) 13 App Cas 523. 83 Hunter v Moss (n 79); Re Re Lehman Brothers International (Europe) (n 80).

80

kept by the Coinbase Group. It is submitted that this is a matter of contract between the

exchange and user, as set out in the User Agreement.

In light of these considerations, it is highly likely that assets held in Coinbase Digital Currency

Wallets are claims against Coinbase in proportions identified by the repository of buy/sell

orders and instructions those Wallets contain. This, however, remains speculative and, in the

absence of any proper disclosure or clearer drafting, it is submitted that the Coinbase User

Agreement exemplifies the kind of opaque exchange user agreement to which Professor

Anderson et al drew attention in their survey. Citing their analysis of the financial statements

filed at Companies House, as against the reported assets under management and relative

size of the UK cryptocurrencies markets and its GDP,84 those authors conclude that Coinbase

probably executes all trades off-chain.

4.1.2.2. Gemini

By contrast, the Gemini User Agreement 85 demonstrates a higher degree of legal and

technical sophistication. As with Coinbase, a Gemini account comprises a number of sub-

accounts: one or more of a ‘Fiat Account’ that reflects its fiat currency balance; and a ‘Digital

Asset Account’ that reflects its Digital Asset balance. Each Digital Asset Account is further

subdivided into ‘Depository Accounts’ and ‘Custody Accounts.’86

Gemini is a fiduciary under § 100 of the New York Banking Law in respect of both Fiat and

Digital Asset Accounts. The precise ownership provisions, however, differ between accounts.

In respect of Digital Assets, users are told that Gemini is:

… a custodian that is licensed to custody your Digital Assets in trust on your behalf.

Gemini custodies your Digital Assets in either a Depository Account or a Custody

Account controlled and secured by Gemini; the balances of which are reflected in

the Digital Asset Account of your Gemini Account. Digital Assets custodied in a

Depository Account are pooled together in one or more of our Digital Asset wallets.

Digital Assets custodied in a Custody Account are custodied pursuant to the

84 Anderson et al (n 34), 14-15. 85 Gemini User Agreement, < https://gemini.com/user-agreement/#user-agreement-archive > accessed 19 April 2019. 86 Gemini User Agreement, ‘Account Types,’ < https://gemini.com/user-agreement/#account-types > accessed 15 April 2019.

81

Custody Agreement entered into by and between you and Gemini Trust Company,

LLC […]

Digital Assets custodied on your behalf and reflected in the Digital Asset Account

of your Gemini Account are not treated as general assets of Gemini.87

It seems, therefore, that Digital Assets ‘custodied’ in Depository Accounts are intended as

impressed with trusts. By contrast, Digital Assets ‘custodied’ under the Custody Agreement88

are expressed to be bailed Assets with Gemini as bailee,89 and are held in Custody Accounts

in the name of the user. Users agree and understand that:

Your Custody Account will have one or more associated unique Blockchain

Addresses in which your Assets will be (i) segregated from any and all other assets

held by us and (ii) directly verifiable via the applicable blockchain. We will provide

you with all Blockchain Addresses associated with your Custody Account.

The ownership of your Assets will be clearly recorded in our books as belonging

to you. Our records will at all times provide for the separate identification of your

Assets. We will not loan, hypothecate, pledge, or otherwise encumber any Assets

in your Custody Account, absent General Instructions from you.

You agree and understand that nothing herein prevents us from using our Cold

Storage System to custody our own property and/or the property of third

parties; provided, however, that, at minimum, separate Blockchain Addresses are

utilized to segregate your Assets from such other property.90

Use of the term ‘separate blockchain addresses’ strongly suggests use of a HD seeded wallet

to generate different public addresses for Custody Account clients, which, indeed, enable such

segregation of public addresses without necessarily giving users control over the assets by

means of a private key. If the property characterisation at Part 4.1.1.4 is accepted, it is

submitted that it accommodates the terms Gemini’s Custody Account: users, in receiving at a

87 Gemini User Agreement, ‘Your Digital Assets,’ < https://gemini.com/user-agreement/#your-digital-assets > accessed 15 April 2019. 88 Gemini Custody Agreement < https://gemini.com/custody-agreement/> accessed 15 April 2019. 89 Gemini Custody Agreement (n 88), ‘Custodian Appointment.’ 90 Gemini Custody Agreement (n 88), ‘Custody Account.’

82

segregated public address, hold legal title to their right to be recognised by and participate in

the relevant blockchain network; such abstract entitlement is then bailed to Gemini, which

holds the legal interest of possession, represented by the private key, in respect of this

entitlement. It seems that the statement that “all Exchange trading activity [on Gemini] is ‘off-

chain’ and not broadcast to a given blockchain,”91 applies only to Depository Accounts, if, as

the Custody Agreement states, Custody Accounts can be directly verified on the public

blockchain.

Bailments come in a variety of forms, but certain general obligations are imposed on every

bailee. Bailees must take reasonable care of the bailed goods and must not convert them;92

usually, this will include a prohibition against denying the bailor’s title.93 Bailees must also

not deviate from the terms of the bailment and becomes an insurer if he does.94 These

obligations are generally in line with those accepted by Gemini which, in respect of Custody

Accounts and custody of Assets, Gemini expressly disclaims any obligations requiring Gemini

to “expend or risk [its] own funds, property, or otherwise incur any financial liability, in the

performance of any of [its] duties” and accepts a general standard of duty in accordance with

the ‘Reasonable Care’ section of the User Agreement.95 This is generally framed in terms of

“reasonable care and commercially reasonable efforts.”96

By contrast, Gemini Depository Accounts impressed with trust involve no separation of legal

title and legal possession: both vest in Gemini, against whom Depository Account holders

have a claim as, as it would appear to be, beneficiaries under a trust. Some proprietary

interest, therefore, in the participation right in the network and directions as to dealings with

trust property would also be conferred upon users. Again, as with Coinbase, however,

dealings from such accounts are disclosed as executed ‘off-chain’; similar risks of shortfall,

thus, arise.

91 Gemini User Agreement, ‘Gemini Exchange’ < https://gemini.com/user-agreement/#gemini-exchange > accessed 1 April 2019. 92 Morris v CW Martin & Sons Ltd [1966] 1 QB 716, 738 (CA), per Salmon LJ; East West Corp v DKBS 1912 [2003] EWCA Civ 83. 93 Biddle v Bond (1865). 6 B & S 225, 122 ER 1179; Ross v Edwards & Co (1895) 73 LT 100. 94 Lilley v Doubleday (1881) 7 QBD. 510; Shaw v Symmonds & Sons Ltd [1917] 1 KB 799; Mitchell v Ealing London Borough Council [1979] QB 1. 95 Gemini Custody Agreement (n 88), ‘Custodial Obligations.’ 96 Gemini User Agreement, ‘Reasonable Care’ < https://gemini.com/user-agreement/#reasonable-care > accessed 1 April 2019.

83

Other than this, the main difference between the strength of property rights in Digital Assets

held in Depository and Custody Accounts is, thus, the difference between the rights of a

beneficiary under a trust and those of a bailor. Given the express disclaimer of traditional

obligations associated with trusts, as is common in the modern commercial trust context,97

there is unlikely to be any significant difference in the personal rights vis-à-vis Gemini itself as

trustee or bailee. The main property distinction, and no insignificant one at that, is that title in

the context of bailment is retained by the bailor. If, therefore, New York State law, which

governs the Gemini Agreement, 98 recognises that intangibles may be the subject of

possession, Gemini Custody Account clients have relatively strong property rights in their

Digital Assets; stronger than those associated with Coinbase and Gemini Depository

Accounts, as well as intermediated securities held in omnibus custody accounts.

4.1.3. Summary

This Part set out to explore the basic legal property issues which arise in respect of ‘native’

cryptocurrencies analysed on their own coding terms. It established that, notwithstanding the

influential precedent of definitive book-entry securities, the blockchain cannot be considered,

without more, a definitive title register of registered securities or records as to bearer assets.

Nor, notwithstanding the commercial and practical coding emphasis on the private key as the

means to control and transfer crypto assets, can the private key be conflated with the asset

itself. The central property question was therefore identified as being the legal weight to be

given to each of the private key, the blockchain, and the relationships between users of nodes,

in a broader analysis which considers the network as a whole.

97 Law Commission of England and Wales, ‘Trustee Exemption Clauses’ (Law Com No 301 Cmmd 6874, 2006); Financial Markets Law Committee (UK), ‘Trustee Exemption Clauses: Analysis of the Role of the Trustee in the Wholesale Financial Markets and of the Proposals Contained in the Law Commission's Consultation Paper No 117’ (FMLC Issue 62, May 2004); also fn 76-79 and text at 18 above. 98 Gemini User Agreement, ‘Governing Law’ < https://gemini.com/user-agreement/#governing-law > accessed 1 April 2019.

84

The proposed characterisation of a crypto asset was a right to participate in a collective

undertaking with a quantum of value determined by network consensus. In the public network

contexts of Bitcoin and Ethereum, the unincorporated association was identified as the most

appropriate vehicle for such characterisation. In respect of the private key, a documentary

intangibles analysis, intellectual property analysis were both considered, before concluding

that the private key is essentially an ID credential which is increasingly treated as a valuable

asset in its own right. It then considered the proposal that the private key could be a rebuttable

presumption of ownership, before suggesting that a better analysis would treat the private key

as definitive of the legal interest of possession of the crypto asset, in the sense of exercising

over such asset rights of use, transfer, and control.

The final section then applied this foundation to indirect holdings of crypto assets through

exchange-hosted or custodial wallets and concluded that holding through exchange-

intermediaries arguably creates a new interest in such rights: if the exchange holds a

participation right vis-à-vis the network, exchange users in their exchange wallets hold some

claim against the exchange in respect of this right; claims, which furthermore, are freely traded

as assets in their own right. Characterisation of this derivative interest will, in the first instance,

depend on the precise contractual relationship between exchange and user, as well as the

technology underpinning the exchange’s API. It was seen that a Gemini Custody Account

offers presumed use of HD seeded-wallets to generate public addresses from a single master

key, held in their possession as bailor. Gemini Depository Accounts and Coinbase, on the

other hand, tended to use omnibus public addresses in which users own a claim – either in

trust or contract – against the exchange in proportions evidenced by the repository of

instructions in their exchange wallet.

85

4.2. ICOs and Issuers

At this point, the narrative begun in Chapter 2 of the evolution of financial forms – defined in

this paper as the symbol used to represent an abstract, transferrable, and valuable obligation

– properly resumes. From beginnings in paper instruments, through the book-entries of

intermediaries, such form is now starting to see trends towards what the International

Securities Services Association (‘ISSA’) and Swiss Financial Market Supervisory Authority

(‘FINMA’) both define as ‘Asset Tokens.’1 Many start-ups, typically in the fintech sector, have

opted to raise investment capital, complete with attendant voting and profit-sharing

entitlements, directly from the public as an ‘initial coin offering’ (‘ICO’). On the other hand,

established issuers accustomed to regulatory oversight and the public exchanges are far more

likely to market their forays into the crypto sphere by emphasising the underlying DLT, using

phrases such as ‘issuing traditional securities on a blockchain.’

From a property perspective, there is little to distinguish the two: in both cases, the substantive

obligation underpinning the financial asset is largely the same (claims against the issuer) and

the form used to represent this obligation is the same (a crypto asset). The only real legal

difference is that one falls within the remit of the existing financial regulation whereas the other

may not. In this regard, financial regulators across jurisdictions are slowly gaining the

confidence to look beyond the novelty of cryptographic form to recognise that the substance

of unregulated ‘asset tokens’ render them indistinguishable from traditional securities subject

to the whole gamut of financial regulation.2 For would-be issuers, regulatory ‘sandboxes’

remain one of the most compliance-friendly ways through which to experiment with DLT-

enabled issues of securities. In the UK, since the first cohort of firms were admitted to the

Financial Conduct Authority’s (‘FCA’) Sandbox on 7 November 2016, 14 out of a total 118

admitted have specifically explored the use of DLT in the primary markets (Table 1).

1 Chapter 4, Tables 1 and 2 at 51 above. 2 See, for example, the ASIC’s Information Sheet 225, ‘Initial Coin Offerings and Crypto-Assets’ (May 2019 Update) < https://asic.gov.au/regulatory-resources/digital-transformation/initial-coin-offerings-and-crypto-assets/ > accessed 31 January 2020; and CMS Legal Services EEIG, ‘Initial Coin Offerings: New Means of Fundraising’ (March 2018) <https://cms.law/en/INT/Publication/Initial-Coin-Offerings-New-means-of-fundraising > accessed 19 April 2019.

86

Table 1. Summary of FCA Sandbox businesses testing the use of DLT in primary issuance3

Cohort 1: 18 businesses admitted for testing; announced 11 July 20164 Issufy A web-based software platform that streamlines the overall Initial Public Offering (IPO) distribution

process for investors, issuing companies and their advisers. Nivaura A platform that uses automation and blockchain for issuance and lifecycle management of private

placement securities. Otonomos A platform that represents private companies’ shares electronically on the blockchain, enabling

them to manage shareholdings, conduct book building online and facilitate transfers. Cohort 2: 24 businesses admitted for testing; announced, 15 June 20175 BlockEx BlockEx wish to test a bond origination, private placement and lifecycle management platform

based on distributed ledger technology. Nivaura Nivaura’s focus is on automating the primary issuance and administration of financial assets

through a centralised system or a blockchain infrastructure. Cohort 3: 18 businesses admitted for testing; announced 15 Dec 20176 ResonanceX New electronic platform that enables end-to-end automation of price discovery, execution and life-

cycle management of structured products using centralised or blockchain asset custody. Cohort 4: 29 businesses admitted for testing; announced 3 July 20187 BlockEx Platform that facilitates the issuance and manages the lifecycle of regulated bonds using DLT. Capexmove Platform that uses DLT to allow small companies to raise capital in a more efficient and streamlined

way. Fineqia Blockchain-based digital platform that enables companies to issue and administer debt and equity

securities, including bonds backed by cryptoassets. Globacap Capital raising platform for SMEs and institutional investors which facilitates the issuance process

of debt and equity securities. Globacap use DLT to simplify and streamline the issuance process.

TokenMarket Funding platform that uses DLT to facilitate the issuance of shares in private companies more efficiently.

20|30 DLT-based platform that allows companies to raise capital in a more efficient and streamlined way. The test will be facilitated in conjunction with London Stock Exchange Group and Nivaura.

Cohort 5: 29 businesses admitted for testing; announced 29 April 20198 London Stock Exchange Group

A test that will integrate DLT within LSEG-operated listing and trading venues to test market infrastructure for the issuance, admission and trading of equity securities, evidencing the change of beneficial ownership. LSEG has invited Nivaura and select market practitioners along the value chain to participate as part of this test

Torca A platform that uses DLT to streamline the capital raising process, providing a one-stop-shop for issuing securities, including onboarding, raise-management and token issuing services. The platform aims to increase transparency and speed of execution for both security issuers and investors.

3 FCA Regulatory Sandbox Website < https://www.fca.org.uk/firms/regulatory-sandbox > accessed 1 March 2019. 4 FCA Regulatory Sandbox Website < https://www.fca.org.uk/firms/regulatory-sandbox/cohort-1 > accessed 1 March 2019. 5 FCA Regulatory Sandbox Website < https://www.fca.org.uk/firms/regulatory-sandbox/cohort-2 > accessed 1 March 2019. 6 FCA Regulatory Sandbox Website < https://www.fca.org.uk/firms/regulatory-sandbox/cohort-3 > accessed 1 March 2019. 7 FCA Regulatory Sandbox Website < https://www.fca.org.uk/firms/regulatory-sandbox/regulatory-sandbox-cohort-4-businesses > accessed 1 March 2019. 8 FCA Regulatory Sandbox Website < https://www.fca.org.uk/firms/regulatory-sandbox/cohort-5 > Accessed 19 May 2019.

87

4.2.1. LuxDeco-Nivaura

Of these firms, Nivaura is a software company which aims to facilitate “automation of the entire

lifecycle of a financial instrument,”9 and remains the only firm with multiple admissions for

testing. In November 2017, Nivaura partnered with the luxury furniture company, LuxDeco, to

issue two bonds in tandem. Both were live deals making use of a public blockchain and

Nivaura’s platform, but in significantly different ways.

Commercially, the issues were identical and structured as a standard registered Eurobond

(Figure 1) which have the following features:10

(i) The securities are issued as a global certificate representing the entire issue;

(ii) Legal title to the global certificate is held by a nominee, whose name appears in the

register;

(iii) Title is held by the nominee for the chain of depositories and custodian entities

comprising the clearing system, all of whom hold accounts for sub-beneficiaries;

(iv) The investor is the ultimate sub-beneficiary in this chain;

(v) The issuer’s payment obligations under the bond are performed via a paying agent

appointed, who remits payments to the investors through the clearing systems;

(vi) Trustees are appointed to represent the interests of the investors and play a major

enforcement role if the issuer defaults.

The Control bond retained this basic structure (Figure 2), but included some differences:11

(i) Investors paid investment capital into Nivaura’s client account, which was immobilised

there, through an ordinary bank transfer;

(ii) This deposit was mirrored by the addition of tokenised credits to the relevant investors’

cash accounts on the Nivaura platform;

(iii) The bonds were issued into LuxDeco’s securities account on the blockchain platform;

(iv) Upon settlement, the bonds were transferred to the relevant creditors’ securities

accounts as the cash was transferred to LuxDeco’s cash account on a typical DvP

basis.

9 R Cohen et al, ‘Automation and Blockchain in Securities Issuances,’ (2018) 3 JIBFL 144, 147. 10 Cohen et al (n 9), 144-145. 11 Cohen et al (n 9), 145.

88

By contrast, the Experimental bond was denominated in Ether, and was issued entirely without

recourse to any of the existing market infrastructure (Figure 3):12

(i) Investors transferred Ether from their existing wallets to their Nivaura wallets;

(ii) On settlement, Ether was transferred from the investors’ wallets to LuxDeco’s public

address, and the bonds, represented by ERC20 Tokens,13 passed from LuxDeco’s

securities wallet address to the investors’ addresses;

(iii) These changes in state were recorded in a public blockchain, which functioned as the

register;

(iv) Smart contracts were deployed to automate payment of principal and interest to

investors’ addresses;

(v) Custodians provided key custody and reconciliation services between the internal

Nivaura platform records and the public blockchain.

Figure 1. Traditional Eurobond in the current financial markets infrastructure14

12 Cohen et al (n 9), 146. 13 Telephone conversation between R Cohen and author, 31 May 2019. 14 R Cohen et al, ‘Banking on the Blockchain,’ (February 2018) IFLR 24, Figure 1 at 43 < http://www.allenovery.com/SiteCollectionDocuments/Banking_On_The_Blockchain.pdf > accessed 30 March 2019.

89

Figure 2. The LuxDeco-Nivaura Control Bond15

Figure 3. The LuxDeco-Nivaura Experimental Bond16

15 Cohen et al (n 14), Figure 2 at 44. 16 Cohen et al (n 14), Figure 3 at 45.

90

In both the Control and Experimental bonds, the asset itself remained a registered security,

and the FCA considered the public blockchain sufficiently independent to satisfy the regulatory

requirements for third-party reconciliation of the register.17 There was, therefore, “no need for

a registrar to keep a register of holders; the register was the blockchain.”18 It is, however,

unclear whether this does indeed mean, as contended, that “the blockchain allowed for legal

and beneficial title to be united.”19 If the public blockchain is intended to function as the

definitive register, it would need to be supplemented by some additional database to link key

pairs with legal persons. This appears to be within Nivaura’s contemplation. Applications that

leverage the blockchain were cited as a potential solution to the pseudo-anonymity problem;

in this particular use case, the digital custody service was the relevant application. 20 It

appears, therefore, that the Custodian’s records of key custody clients may be used to

supplement the blockchain register.

Here, it is worth noting a useful legal precedent in the Spanish system of holding intermediated

securities in a similar two-tier structure. First, Iberclear, the Spanish CSD, maintains a ‘Central

Register’21 which contains the aggregate balances of securities held in the accounts of each

Iberclear participant, which are typically financial institutions. Second, the participants each

maintain ‘Second-tier Registers’22 in respect of their own customers’ holdings. The two

registers are linked by a common register reference for each account entry which correspond

to a particular transaction; a new register reference must be generated each time there is a

transfer in ownership, upon which the prior register reference is cancelled.23 The two registers

are, thus, treated as a single, record of ownership.24 There is no reason why not, therefore,

the blockchain supplemented by the Custodian’s records could not cumulatively operate as

the definitive register identifying exactly who is entitled to the benefit of the security.

The role of the private key in this context of the blockchain as a definitive register, then, falls

to be considered. Transfers of the Experimental Bond were effected and recorded by way of

17 Cohen et al (n 9), 147. 18 Cohen et al (n 9), 147. 19 Cohen et al (n 9), 147. 20 Cohen et al (n 9) 147. 21 Article 19.2, Consolidated Text of the Regulation of Sociedad de Sistemas (‘Iberclear Regulation’) as at 6 September 2017 < http://www.iberclear.es/ing/Regulations/Legal-Framework > accessed 9 April 2019. 22 Article 19.3, Iberclear Regulation (n 21). 23 Law Commission of England and Wales, ‘The UNIDOIT Convention on Substantive Rules Regarding Intermediated Securities: Further Updated Advice to HM Treasury’ (May 2008), [2.44]. 24 Article 19.1 Iberclear Regulation (n 21).

91

dealings in ERC20 tokens directly through investors’ crypto wallets. The private key therefore

functioned as the means through which transfers of the registered security were effected.

Notwithstanding that this is likely to be the only way in which users exercise such rights of

ownership, Nivaura does not expect that investors will store and manage private keys directly.

Rather, Nivaura’s digital custody service is structured in such a way that private keys are held

by a Custodian, with direct access granted to investors by means of a PIN.25 Such a method

eliminates the risk of losing access to assets if private keys are lost; if an investor forgets his

PIN, a new one may be generated by the Custodian upon adequate proof of identification.26

This raises several questions regarding the legal characterisation of the private key, and the

basis upon which they are held by the Custodian. If the bonds themselves are registered

securities to which legal title is held directly by the investor, using the proposed

characterisation in Part 4.1.1.4, the only characterisation possible is that the security is bailed

to the Custodian, who holds the interest of possession represented by the private keys. Given,

furthermore, that the use of the private key is largely ‘self service’ through use of the PIN,27 it

does not seem that investors face the risks arising with off-chain transactions: private keys are

held by the Custodian but are accessed directly by investors under, as it were, a bare bailment,

rather than through issuing mandates. Rather, the greater difficulty lies in the fact that the

blockchain network used – at least for the Sandbox context – is public and, therefore, the

Ethereum mining community owes no duty to neither issuer nor investor to maintain the

blockchain. This, however, would appear to be largely a matter for the issuer; Nivaura’s

platform is ‘blockchain-agnostic’ in the sense that it is a software company, not a blockchain

company, and its platform may be used across any blockchain network.28

A related question arises as to personal liabilities. For example, for whom does the Custodian

– as asset keeper, critical interface between the pseudo-anonymous blockchain and legal

identity of the investors, and potential part of the legal register – act: issuer or investor? To

some extent, that the digital custody service is a software licensed to issuers suggests that

the Custodian is appointed by the issuer. Although Nivaura played the role of Custodian within

the Sandbox, Nivaura does not expect to fulfil this function in non-Sandbox applications, in

which context independent entities will perform this role.29 The importance, however, of a

25 Telephone conversation between R Cohen and author, 31 May 2019. 26 Telephone conversation between R Cohen and author, 31 May 2019. 27 Telephone conversation between R Cohen and author, 31 May 2019. 28 Telephone conversation between R Cohen and author, 31 May 2019. 29 Telephone conversation between R Cohen and author, 31 May 2019.

92

robust framework for personal liabilities becomes more apparent when considered in the

context of the actual performance of the issuer’s payment obligations. In the case of the

Experimental bond, rather than payments due under the bond ‘trickling down’ the chain of

custody,30 automation via a smart contract enables payments to be made directly to holders.31

However, removing the intermediary typically involved in remittance, the paying agent, raises

novel issues because economic value in performance of an underlying obligation, enforceable

by legal action, is premised upon performance by legal persons capable of being sued.

Paying agents stand at the ‘top’ of the custody chain and are appointed pursuant to an agency

agreement, to which the agent, issuer, trustee and the guarantor are typically all party. When

a payment of interest or principal falls due, the issuer is obliged under the agency agreement

to transfer the funds to the paying agent, who then is responsible for ensuring that the

payments are duly remitted to the relevant investors. The liabilities between the parties are

structured in such a way that, as between issuer and investor, failure by the paying agent to

make a requisite payment does not generally discharge the issuer’s obligation vis-a-vis the

holder, even if the issuer has already paid the relevant amount to the paying agent.32 Should,

therefore, the paying agent fail to make a payment to the investors having been put into funds,

the issuer remains liable to the investors, but has an action against the paying agent under

the terms of the agency agreement. Most agency agreements typically provide for a banker-

customer relationship (Figure 4); thus, any money transferred by the issuer to the paying agent

is so transferred as unsecured creditor, and the issuer’s action against a defaulting paying

agent arises in simple debt. Should, therefore, the paying agent fail to make any payment

having collapsed into insolvency after having been put into funds, the issuer’s claim would fall

to compete with those of all other unsecured creditors.33

30 Cohen et al (n 9), 145 31 Cohen et al (n 9), 147 32 G Fuller, The Law and Practice of International Capital Markets (3rd ed, LexisNexis 2012), [3.23]. 33 Fuller (n 32), [3.24].

93

Figure 4. Example of standard provisions in an Agency Agreement regarding funds paid

by issuer to paying agent.34

(1) Each Paying Agent will be entitled to deal with money paid to it by the Issuer

for the purposes of this Agreement in the same manner as other money paid to

a banker by its customers, except that:

(a) it will not exercise any right of set-off, lien or similar claim in respect of the

money; and

(b) it will not be liable to account to the Issuer for any interest on the money.

(2) In acting under this Agreement and in connection with the Notes each Paying

Agent will act solely as an agent of the Issuer and will not assume any

obligations towards or relationship of agency or trust for or with any of the

owners or holders of the Notes or the Coupons.

It should be underscored that such insolvency would not affect the legal rights of the investor

against the issuer, whose obligations under the asset itself are not discharged by transfer of

funds to the paying agent. In practical terms, however, the insolvency of the paying agent

would likely have some effect on the investor’s chances of being paid, whether through the

immediate default or on future performance, as the issuer’s action against the paying agent

may well turn out to be worthless. Issues governed by US law, on the other hand, offer holders

a proprietary advantage. Under the Trust Indenture Act 1939, all sums paid to the paying

agents by the issuer for the payment of principal and interest on the notes are held on trust for

the holders or the trustee.35 Although under English law, a Quistclose trust36 may, in theory,

arise in light of the express intention of the issuer that the money is paid for a specified

purpose, the express disclaimers of any trust that are typical of agency agreements will

prevent such trust from arising (Figure 4).

Irrespective, however, of the strength of the property rights or ‘guarantee,’ as it were, that an

investor can expect the underlying promise by the issuer to pay will be honoured, that there is

34 Fuller (n 32), [3.27]. This is an example for a stand-alone issue with a fiscal agent and no guarantor. 35 s 317(b) Trust Indenture Act 1939 15 USCA §77aaa (2012). 36 Barclays Bank Ltd v Quistclose Investments Ltd [1970] AC 567 (HL).

94

a clear division of responsibility and an identified defendant to an action provides, in itself, a

measure of legal certainty. Where, however, the paying agent’s function is automated by a

smart contract, there is uncertainty as to what redress an investor or the issuer has if the code

fails to execute correctly and any funds intended to fulfil payment obligations are lost. The

relevant question seems to be whether a smart contract could similarly be held to be a ‘debtor’

to the issuer; or be otherwise liable for its own failure to execute in the same way as the paying

agent is a debtor vis-a-vis the issuer which has put it in funds; or alternatively, hold funds on

trust as does a paying agent who is subject to the US Trust Indenture Act 1939.

In this latter case, it is worth noting that Ethereum smart contract accounts are able to hold

funds to be ‘unlocked’ and distributed upon being called into execution,37 so it would be

possible for issuers to make funds available in advance of the hypothetical error in execution

of the smart contract code. Assuming a court would be willing to hold a trust has arisen over

Ether38 held in a contract account, such rights under a trust, hitherto the ‘holy grail’ of third

party proprietary claims, would not, however, actually be of any avail to the holders if the error

in code execution involved an irrevocable loss of access to the funds. In 2017, approximately

US$150-300 million worth of Ether was irretrievably lost after a developer inadvertently

exploited a bug in the Parity wallet library contract; in an attempt to rectify the problem in the

affected multi-sig wallet, the developer accidentally deleted the library code itself. All Parity

multi-sig wallets relying on that code were consequently frozen.39 In cases involving such

errors, essentially where trust property is destroyed, given that the only redress available to

beneficiaries would be personal actions for breach of trust and account, the question remains

how a smart contract can be held in law a trustee and legal person owing personal duties to

the holders.

This is subject of an on-going and inconclusive debate in the crypto sphere: ascribing or

imputing civil and criminal liability for failures in self-executing code and programmes to an

appropriate defendant. Jenny Leung, writing for Coindesk, notes that:

37 Part 3.2.1 at 38 et seq above. 38 In B2C2 Ltd v Quoine Pte Ltd [2019] SGHC (I) 03 at [141]-[146], the International Commercial Court of Singapore (International Judge Thorley QC) found a trust could be impressed upon cyptocurrencies. 39 As set out in the Github < https://github.com/paritytech/parity-ethereum/issues/6995 >; reported by J Wilmoth, ‘Parity’s $150 Million Wallet Bug’ (CCN, 11 September 2017) < https://www.ccn.com/i-accidentally-killed-it-parity-wallet-bug-locks-150-million-in-ether > accessed 19 April 2019.

95

Somewhat analogously [to company law], a ‘tech veil’ has helped code developers

escape liability from state and federal regulations and civil lawsuits arising from

bugs in, or third parties’ malicious use of, their code. This ‘tech veil’ is maintained

by courts’ willingness to uphold broad disclaimers in open source software

licenses, and is bolstered by the principled argument that users (not coders)

ultimately cause and should take responsibility for criminal violations of law.40

Ms Leung, however, continues to report an apparent change in attitude to coder liability, citing

a speech given by Brian Quintez, Commissioner of the US CFTC, in October 2018 which

proposed a test of reasonable foresight:

…the appropriate question is whether these code developers could reasonably

foresee, at the time they created the code, that it would likely be used by US

persons in a manner violative of CFTC regulations. In this particular hypothetical,

the code was specifically designed to enable the precise type of activity regulated

by the CFTC, and no effort was made to preclude its availability to US

persons. Under these facts, I think a strong case could be made that the code

developers aided and abetted violations of CFTC regulations. As such, the CFTC

could prosecute those individuals for wrongdoing. 41

A similar approach was independently applied in the civil context at first instance in B2C2 Ltd

v Quoine Pte Ltd,42 heard in the International Commercial Court of Singapore. The issue

arose in an allegation of contractual mistake in respect of an algorithmic trading program,

which had executed trades according to pre-programmed prices wholly without human

intervention. Given that the party seeking to enforce the contract was required to show

knowledge of a sufficiently important or fundamental mistake in the terms, the claim raised the

question of to whom knowledge in respect the relevant trades should be ascribed.

40 J Leung, ‘7 Legal Questions That Will Define Blockchain in 2019,’ (Coindesk, 3 January 2019) < https://www.coindesk.com/7-legal-questions-that-will-define-blockchain-in-2019 > accessed 4 January 2019. 41 B Quintez, ‘Remarks at the 38th Annual GITEX Technology Week Conference,’ (October 2018) < https://www.cftc.gov/PressRoom/SpeechesTestimony/opaquintenz16 > accessed 4 January 2019. 42 B2C2 Ltd (n 38). An appeal was heard against certain aspects of the decision in October 2019 but, at the time of reviewing the paper for publication, the decision of the appellate court had not yet been handed down.

96

International Judge Thorley QC began by noting that the law on knowledge in cases where

computer programs have replaced human actions will undoubtedly develop, especially in

cases of artificial intelligence where the computer in question could be said to ‘have a mind of

its own.’43 The Judge expressed confidence in the law to adapt, citing at [207] Lord Briggs in

the recent UK Supreme Court decision, Warner-Lambert Co Ltd v Generics (UK) Ltd:44

Even if the manufacturer is a corporation using a factory entirely staffed by

robots, if the manufacturing process is only protected by the patent if it is

carried out for a particular purpose, the requirement to identify a mental

element on the part of the manufacturer is simply inescapable. The court is

well versed in identifying the governing mind of a corporation and, when the

need arises, will no doubt be able to do the same for robots. 45

Drawing a parallel with computers used for trading purposes but mindful of the fact that the

present case was at first instance, the Judge proposed not to express any view on the precise

legal relationship between computers and their programmers. In any event, the Judge noted

that the programmes in question were deterministic; they had no artificial intelligence

capacities and only did what they were programmed to do in an arbitrary manner.46 Hence:

Where it is relevant to determine what the intention or knowledge was underlying

the mode of operation of a particular machine, it is logical to have regard to the

knowledge or intention of the operator or controller of the machine. In the case of

the kitchen blender, this will be the person who put the ingredients in and caused

it to work. His or her knowledge or intention will be contemporaneous with the

operation of the machine. But in the case of robots or trading software in

computers this will not be the case. The knowledge or intention cannot be that of

the person who turns it on, it must be that of the person who was responsible for

causing it to work in the way it did, in other words, the programmer. Necessarily

this will have been done at a date earlier than the date on which the computer or

robot carried out the acts in question. […]

43 B2C2 Ltd (n 38), [206]. 44 Warner-Lambert Co Ltd v Generics (UK) Ltd [2018] UKSC 56. 45 Warner-Lambert Co Ltd (n 44), [156]; cited in B2C2 Ltd (n 38) at [207]. Emphasis added. 46 B2C2 Ltd (n 38), [208] – [209].

97

Accordingly, in my judgment, in circumstances where it is necessary to assess the

state of mind of a person in a case where acts of deterministic computer programs

are in issue, regard should be had to the state of mind of the programmer of the

software of that program at the time the relevant part of the program was written.47

On the other hand, it may be just to impose some limitations to liability based on the coder’s

knowledge or foresight at the time when the code was programmed. In B2BC, the Defendant’s

Chief Technology Officer in cross-examination was keen to emphasise that programmes may

sometimes execute ‘as designed,’ but that this does not necessarily mean that the

programmes execute ‘as intended’ or ‘as foreseen.’ Granted permission to explain further,

the witness said this in respect of the coding flaw which automatically matched and executed

the relevant orders on the exchange:

A. … these are really complex platforms, by the way, really complex systems,

highly sophisticated. A lot of things can go wrong […] that's why we have bugs

in systems, you know, computers crash. Sometimes it's very difficult to foresee

all the different things that could happen […]

The system matched the forced close with the plaintiff's order, but […] the

balance transfer was a result of an oversight. It shouldn't have happened.

When the other party doesn't have enough balance, it doesn't make any sense

to do the transfer to the other party. That was an oversight on the system. It

was a bug, it was an architectural flaw. It was designed to do that, and it was

a flaw on the system.

Q. Sorry, are you telling the court that the fact that the system was designed to

match, even though a forced-closed customer had insufficient assets, was a

bug in the system?

A. It was a flaw in the system, yes.

Q. But it wasn't a bug?

47 B2C2 Ltd (n 38), [210] – [211]. Emphasis added.

98

A. It was not necessarily a bug. It was an oversight in the design of the system.

So you design a system, you build specifications, this is what is going to

happen. Then a programmer takes it and programmes it. If a designer, for

some reason, forgets, or by oversight doesn't account for all these issues, then

it will happen. So it's not necessarily a bug, it's more system design issue.

Q. You would then agree with me that as design, leaving aside the oversight, the

B2C2's orders were correctly matched with the forced-closed orders?

A. As designed, yes.48

There is a policy element, therefore, to determining the extent to which coders should be liable

for, or are reasonably able to foresee and prevent design issues and bugs, given the difficulty,

keenly felt within the coding community, in writing programmes that execute exactly as

expected.49 In the Overstock Prospectus, to be examined in due course, undiscovered flaws

in the code underpinning digital securities are expressly listed three times in the disclosure of

risks associated with the issue.50 In light of such untested technologies used in ICOs, Peter

van Valkenburg, of Coin Centre, points out:

We do not have similar laws requiring honest disclosure from more diffuse or

abstract common causes to which people give their energies. There is no law, for

example, that the scientific community must be honest about the likelihood that

cancer treatment breakthroughs will be achievable in the near future, nor do we

worry that too many young cancer researchers are contributing to that effort under

a false sense of the common endeavour’s likelihood of success.51

Although there is an obvious difference between cutting-edge research into cancer treatment

and commercial applications of DLT, it is submitted that the difference is one of degree, not

48 B2C2 Ltd (n 38), [75]. 49 A Antonopoulos and G Wood, Mastering Ethereum: Building Smart Contracts and DApps (O’Reilly Media, 2018), 130. 50 Overstock Inc, Prospectus dated 9 December 2015 (Filed 11 December 2015), 6 < http://investors.overstock.com/static-files/aeb7115e-cc0c-482a-9f44-69eade872e53 > last accessed 4 June 2019. 51 P Valkenburgh, ‘Framework for Securities Regulation of Cryptocurrencies,’ (Version 2, Coin Centre August 2018), 48. < https://coincenter.org/entry/framework-for-securities-regulation-of-cryptocurrencies > accessed 24 November 2018.

99

kind; at least in the context of unpermissioned networks and open-source software where no

representations are made, express disclaimers are given, where coders enjoy no privileged

position in respect of a smart contract account once it has been deployed, and nor, crucially,

is any consideration exchanged for use of the relevant programme. Given the extent to which

the law of obligations imposes liability based on consideration52 and objective consensus ad

idem,53 foresight,54 or assumptions of responsibility;55 and furthermore, excludes recovery of

damages for pure economic loss where negligence is pleaded,56 it is submitted that there will

be limitations under the current law in attributing civil liability on developers and coders in the

context of open-source software, at least in the absence of actionable misrepresentation or

fraud.

Given the proprietary nature of Nivaura’s software, these uncertainties in personal liabilities

are less significant in the context of the LuxDeco bond. Here, losses caused by errors in the

code – such as the freezing of funds committed by the issuer to the contract account to be

distributed to the investors under the terms of the bond – are likely to be covered by the terms

of the licencing agreement.57 Given that the investor is excluded from the legal relationships

of both paying agent-issuer under the current framework, and licensor-licensee in the

Experimental bond, it seems likely that the broader framework of personal liabilities will also

be the same: a default on the Experimental bond owing to an error in the code will not affect

LuxDeco’s obligations to its bondholders, even if payments have already been committed to

the contract account. Instead, LuxDeco will have an action of some kind against Nivaura to

remedy the error under the licence. The precise measure of damages, whether in tort or

contract, will largely be a matter of the terms of the licence itself.

Although this provides some insight as to liability between the parties to the issue, it sheds

little light on the closely related issue of losses arising from errors or fraud on the part of the

Ethereum miners or coders. Given that Nivaura’s platform is ‘blockchain-agnostic,’ choice of

blockchain will be a consideration for the issuer and investor. This raises the question of

whether choice of blockchain – for example, public or private; Ethereum or Corda – goes to

52 Thomas v Thomas (1842) 2 QB 851, 859; Re Hudson (1885) 54 LJ Ch 881. 53 For example, Smith v Hughes (1871) LR 6 QB 597. 54 Donoghue v Stevenson [1932] AC 562 (HL); [1932] UKHL 100, as developed through Caparo Industries Plc v Dickman [1990] 2 AC 605 (HL). 55 Hedley Byrne & Co Ltd v Heller Partners Ltd [1964] AC 465 (HL). 56 Spartan Steel and Alloys Ltd v Martin & Co Ltd [1973] QB 27 (CA). 57 Telephone conversation between R Cohen and author, 31 May 2019.

100

the commercial risk associated with the substantive obligation underpinning the asset, or to

its form. It is submitted that the former is the more appropriate of the two, due to the

fragmentation of the property framework which would arise from the latter approach. This will

be more fully explicated in Chapter 5.

4.2.2. Overstock-tØ

Overstock Inc, a Delaware-incorporated company, is another experienced issuer exploring

with blockchain securities. Founded in 1997 as an e-commerce platform, in January 2014, it

became the first major retailer to accept payments in Bitcoin, before continuing its interest in

crypto-assets and DLT by developing online methods of distributing corporate shares away

from the major public exchanges. 58 Known as its ‘Medici’ initiative, such developments

resulted in an announcement in its Prospectus dated 9 December 2015 (the ‘2015

Prospectus’) that Overstock would continue to offer its securities on the traditional exchanges,

but may issue its offerings “as digital securities.”59 By a supplement dated 14 November 2016

(the ‘2016 Supplement’), Overstock registered an offering of up to 1,000,000 shares of

‘Blockchain Voting Series A Preferred Stock and/or Voting Series B Preferred Stock.’60

Digital securities are defined as “uncertificated, registered securities” 61 “represented by

balances written on proprietary ledger built on a blockchain network62 by the Pro Securities

ATS and secured by cryptographic associated key pairs.”63 The Pro Securities ATS is64 a

SEC-registered alternative trading system (‘ATS’), which is used by Overstock as the

exclusive platform on which its digital securities are issued, purchased, and traded. Access

is closed,65 granted only through the sponsorship of the single broker-dealer (the ‘Sole Broker-

Dealer’) licensed to use Overstock’s tØ software to settle trades on Overstock’s ledger and

58 C Metz, ‘Overstock.com Assembles Coders to Build a Bitcoin-Like Stock Market’ (Wired, 10 June 2014) < https://www.wired.com/2014/10/overstock-com-assembles-coders-build-bitcoin-like-stock-market/ > accessed 1 June 2019. 59 Overstock Prospectus (n 50), 4. 60 Overstock Inc, Prospectus Supplement (To Prospectus dated 9 December 2015) dated 14 November 2016 (Filed 14 November 2016), S-3. < http://investors.overstock.com/static-files/39d5b2c0-1c69-4112-b0a5-552edd2a9a4c > last accessed 22 June 2019. 61 Overstock Prospectus (n 50), 34. 62 Overstock Prospectus (n 50), 35. 63 Overstock Prospectus (n 50), 35. 64 Confirmed by the SEC Alternative Trading System (“ATS”) List at < https://www.sec.gov/foia/docs/atslist.htm > last accessed 2 June 2019. 65 Overstock Prospectus (n 50), 34.

101

provide access to the trading platform.66 Potential investors must open an online brokerage

account with the Sole Broker-Dealer to purchase and sell digital securities.67

Two ledgers are used in this trading system: an electronic database, referred to as the

‘proprietary ledger,’ maintained by Pro Securities ATS;68 and a ‘distributed ledger,’ currently

the Bitcoin blockchain.69 The two ledgers track trades in parallel through the following process.

First, trades successfully matched on the Pro Securities ATS are broadcast to and publicly published on the proprietary ledger70 in the names of the traders.71 At the same time, Pro Securities ATS begins the process of “embedding in the blockchain information necessary to mathematically prove the validity of available copies of the proprietary ledger.” This is by way of:

…an editable field that can be used to implant code or other data within the Bitcoin transaction that will be embedded into the blockchain, and the tØ software

will use this field to implant anonymized cryptographic hash functions for the digital securities transactions reflected on the proprietary ledger into the Bitcoin transfer made by the ATS.72

After a set of transactions are successfully recorded on the proprietary ledger, the Pro Securities ATS sends “a de minimis amount of from an ATS-controlled wallet to another ATS-controlled wallet using the blockchain protocol.”73 The blockchain validates this de minimis transaction and embeds it, together with the implanted anonymized cryptographic

hash function, into the blockchain.74 Once the cryptographic hash function containing the trade information is thus immutably ‘embedded’ into the blockchain, the Pro Securities ATS appends the applicable transaction (including the embedded cryptographic hash function) to the proprietary ledger, which “already reflects the consummated digital securities

66 Overstock Prospectus (n 50), 34. 67 Overstock Prospectus (n 50), 34. 68 Overstock Prospectus (n 50), 35. 69 Overstock Prospectus (n 50), 35. 70 Overstock Prospectus (n 50), 36. 71 Overstock Prospectus (n 50), 34. 72 Overstock Prospectus (n 50), 36. 73 Overstock Prospectus (n 50), 36. 74 Overstock Prospectus (n 50), 36.

102

transactions.”75 The updated proprietary ledger information is then given to the transfer agent, trustee or other similar agent with respect to the applicable series of digital securities.76

Thus, there are both similarities and differences with the LuxDeco-Nivaura bond. As a basic

matter of coding techniques, it appears that the tØ software makes use of a kind of coloured

coin to represent dealings in the securities, embedding hashed data within transactions

broadcast to the blockchain network,77 rather than a smart contract token. To some extent,

this may not be of any real significance from a property perspective, as the Overstock digital

securities are, like the LuxDeco Experimental bond, registered securities. This formal

similarity, however, belies a fundamental difference: of the two ledgers used in the tØ platform,

it is the proprietary ledger, not the public blockchain, which functions as the definitive

register.78 The benefits of decentralised trust, however, are said to be retained through the

capacity for anyone with rudimentary cryptographic skills to corroborate the validity of the

proprietary ledger by reference to the distributed ledger.79

Another similarity with the LuxDeco-Nivaura bond is use of a dual-database as the register.

The tØ platform makes use of a supplementary database containing the personal identity

information of holders, maintained by the Sole Broker-Dealer in respect of its online brokerage

account holders, which the Sole Broker-Dealer is obliged to share with Overstock and its

agents under the terms of the licence to use the tØ software.80 The book-entry system is, thus,

expressly stated to comprise both the proprietary ledger and the Sole Broker-Dealer’s client

database. 81 Overstock warns investors that, although the personal identity information

database will not be made public, the information necessary to identify legal persons with

public keys may be compromised in the event of a security breach, thereby potentially

exposing the affected person’s complete trading history in respect of the digital securities.82

75 Overstock Prospectus (n 50), 36. 76 Overstock Prospectus (n 50), 36. 77 This appears to be corroborated by the industry media. Luke Parker reports that ‘Overstocks [sic] ATS’ uses the Open Assets protocol, which describes itself as an ‘evolution of the concept of coloured coins.’ L Parker, ‘Overstock Announces Cryptosecurity Exchange And World's First Crypto Bond (Brave New Coin, 7 June 2015) < https://bravenewcoin.com/insights/overstock-announces-cryptosecurity-exchange-and-worlds-first-crypto-bond > last accessed 2 June 2019. 78 Overstock Prospectus (n 50), 35. 79 Overstock Prospectus (n 50), 35. 80 Overstock Prospectus (n 50), 35. 81 Overstock Prospectus (n 50), 35. 82 Overstock Prospectus (n 50), 6.

103

Trades will be recorded and digital securities will held in brokerage accounts directly in that

customer’s name, rather than in ‘street name.’83

Customers, however, will not have direct control of and access to private keys. Overstock

emphasises the importance of the private key and maintains the position that “the general

public is not yet accustomed to using secure cryptographic methods and managing private

keys.”84 As a result, Overstock, Pro Securities ATS, and the Sole Broker-Dealer each will hold

the private keys, leaving - or, in the subtly different terms of the prospectus, ‘enabling’ -

investors to manage their digital securities with a ‘user-friendly’ login and password in the

same way as a traditional online brokerage account.85 It is not clear whether this means each

of the three entities will hold a copy of the private key individually, or whether the three are

party to a multi-sig wallet. Furthermore, depending on the particular security protocols used

for particular series of digital securities, Overstock, the Pro Securities ATS, and the Sole

Broker-Dealer may be able to transfer digital securities on behalf of investors and/or block

transfers.86

Notwithstanding that Customers will not have access to any private keys, Overstock disclaims

to a certain degree the risks associated with hacking. Investors are informed that online

brokerage accounts may be hacked, resulting in private keys being stolen. Further, where

private keys are held in a centralised repository by Pro Securities ATS and the Sole Broker-

Dealer, the risks are stated to be particularly heightened, as the thief would be able to target

a single security system for breach of multiple accounts.87 Crucially, however, Overstock gives

no assurance that, if such hacker gained access to private keys, “such theft would be detected

in time to hold the culprit accountable.”88

On some level, theft of private keys is less of a property concern in the case of registered

assets, as opposed to bearer assets represented by the private key, as the register itself is

the definitive record of title. Presumably, the operator of the system would, by reference to

the time at which the private keys were stolen, would be able to identify on the ledger at what

stage entries should be regarded as erroneous through fraud. Of more concern is the way in

83 Overstock Prospectus (n 50), 34. 84 Overstock Prospectus (n 50), 6. 85 Overstock Prospectus (n 50), 6. 86 Overstock Prospectus (n 50), 35. 87 Overstock Prospectus (n 50), 6-7. 88 Overstock Prospectus (n 50), 7.

104

which private keys are held by three persons: Overstock, Pro Securities ATS, and the Sole

Broker-Dealer. This is significant, especially given the corporate relationships upon which the

digital securities trading platform is structured. This involves the following entities:

1. Overstock Inc: the issuer.

2. Medici Ventures, Inc: a FinTech company which owns a portfolio of blockchain

companies. Medici Ventures is a wholly-owned subsidiary of Overstock launched

in 2014.89

3. The tZERO Group, Inc: a fintech company 90 and owner/developer of the tØ

software underpinning the digital securities trading platform; licensor of the use of

the tØ software to the Sole Broker-Dealer and to Pro Securities ATS. The tZERO

Group is one of the portfolio companies owned by Medici Ventures Inc91 and is

majority-owned by Overstock.92

4. t0.com, Inc: the name of the tZERO Group between 21 October 2016 and until at

least March 2018.93 As at 1 March 2018, Medici Ventures held 81% of ownership

in t0.com, Inc, which had been transferred by Overstock.94 Overstock therefore

indirectly owned 80.1% of t0.com, and the remaining 19.9% of t0.com was held by

31 other individual or entity shareholders “many of whom are employees or former

employees of t0.com, Inc.”95 As at 1 March 2018, t0.com Inc stated it “has, to date,

relied upon funding from Overstock and if such funding were not provided, it would

have an adverse impact on [t0.com, Inc’s] operations and financial conditions.”96

89 See further the Medici website < https://www.mediciventures.com/ > last accessed 6 April 2019. 90 Overstock Inc, Prospectus dated 15 March 2019, 2. Available within the Prospectus Supplement dated 18 March 2019 (Filed 18 March 2019) < http://investors.overstock.com/static-files/40ff2707-5c3b-46ba-b90c-f573f28f8450 > accessed 15 April 2019. 91 Medici Website < https://www.mediciventures.com/ > 92 Overstock Prospectus (n 90), 2. 93 The most recent Overstock Prospectus, dated 15 March 2019, refers to this name change. The t0.com Inc, Amended, Supplemented, and Restated Offering Memorandum dated 1 March 2018 (SEC Ex-99.1, made available by Overstock by way of voluntary disclosure), also refers to this name change at 1 < https://www.sec.gov/Archives/edgar/data/1130713/000110465918013731/a18-7242_1ex99d1.htm > accessed 28 April 2019. 94 t0.com Offering Memorandum (n 93), 1. 95 t0.com Offering Memorandum (n 93), 1. 96 t0.com Offering Memorandum (n 93), 31.

105

5. Medici, Inc: the original name of the tZERO Group. Medici was incorporated in

2014 as part of Overstock’s commitment to DLT and traded under the tZERO

name.97 On 21 October 2016, Medici formally changed its name to t0.com, Inc.

Medici was also a wholly-owned subsidiary of Overstock until 2015 when 19% of

its holdings in Medici was transferred to ‘a third party.’ On 3 February 2017,

Overstock transferred the remaining 81% of ownership to Medici Ventures, as

mentioned above.98

6. Pro Securities LLC: the operator of the Pro Securities ATS, and owned by t0.com.99

In 2014, Overstock acquired a 24.9% interest in Pro Securities, which was

transferred to Medici on 26 August 2015,100 before Medici became t0.com and

t0.com became the tZERO Group. Pro Securities LLC also has little by way of its

own resources and depends on Overstock for funding.101

7. Keystone Capital Corporation: the Sole Broker-Dealer for the 2016 offer.102

The implications of such close corporate relationships in the context of an issue of securities

will be explored more fully in Part 4.3. For present purposes, it suffices to note that Overstock,

the debtor-issuer, is the ultimate parent and majority-owner, whether directly or indirectly, of

all the entities involved in the operation of the digital securities platform, and those which have

access to the private keys. Although, the companies are, of course, separate legal persons,

the financial interdependence between the companies is indicative of de facto relationships

which underpin this corporate structure. Overall, there is only one party wholly independent

of Overstock: the Sole Broker-Dealer.

This is to be contrasted with the LuxDeco model, in which the proprietary software has been

developed by an independent entity, which licences its software to (presumably) any and all

issuers who are willing to pay the licencing fee. It is further worth noting that, although the

97 Overstock Prospectus (n 50), 2. 98 t0.com Offering Memorandum (n 93), 1. 99 t0.com Offering Memorandum (n 93), 1. 100 Overstock Prospectus (n 50), 2. 101 Overstock Supplement (n 60), S-18; S-24. 102 Overstock Supplement (n 60), S-3.

106

proprietor of the software, Nivaura, took on various roles in the issue for the purposes of the

Sandbox, it is not expected that they will take on these functions for non-Sandbox issues.103

4.2.3. Summary

This section explored the use of DLT at the first of three levels of the financial markets to be

explored in this paper: between issuer and investor directly. Both the LuxDeco-Nivaura and

Overstock-tØ issues demonstrated that adopting decentralised ledgers at this level has

obvious potential to remedy the fragility of ownership rights inherent in the current

intermediated structure of ownership.

Although both the two models adopted different technical solutions, summarised in Table 2

below, it is significant that both issued registered securities. Unlike bearer securities:

Where securities are issued in definitive registered form, title to the securities

depends, not on possession of the definitive security, but on entry of the holder's

name in a register kept by the issuer or on its behalf by a registrar. The definitive

security that a holder receives is not a document of title, but merely evidence that

the holder's name has been entered in the register. Accordingly, the certificate

need not be security-printed, as the risks of fraud and theft are not so great. The

securities are transferable by execution of a written transfer instrument, and they

are not negotiable instruments under English law.104

This raises the question, in both the LuxDeco-Nivaura and Overstock-tØ case studies, of the

role of the private key where registered securities are registered to public addresses, which

are then linked to legal persons by means of a second database. In this context, the private

key, along with the ERC20 Token and Bitcoin Coloured Coin which represent dealings in the

registered security, can be said to function as the equivalent of the written transfer instrument

associated with traditional securities registers, that is, the means by which users effect

agreements to transfer the assets inter se before the registrar is notified and the register

updated. To some extent, the facts underpinning the blockchain networks render the parallel

103 Telephone conversation between R Cohen and author, 31 May 2019. 104 Fuller (n 32), [1.116].

107

not entirely on point; in the cryptographic method, the execution of the transfer ‘instrument’

and notification of the register occur almost simultaneously, or at least as part of the same

process. This characterisation is consistent with the proposition that private keys represent

the legal interest of possession, insofar as possession may be considered a right of ownership

intrinsically linked with sufficient control over the property in question to effect transfers.

Table 2. Comparison between the LuxDeco-Nivaura and Overstock- tØ solutions

LuxDeco/Nivaura Overstock/tZERO

Type of Securities Registered bond Uncertificated, Registered Stock

Definitive Register Public Blockchain (Ethereum) Internal ‘Proprietary Ledger’

Supplementary Register Nivarua internal records Bitcoin blockchain

Identifying Investors Onboarding records of the

Custodian

Personal information database of

the Sole Broker-Dealer

Trading Representation ERC20 Token Coloured Coin (most probable)

Key Storage/Custody Independent Custodian entity Pro Securities ATS, Overstock,

Sole Broker-Dealer

Investor Access Nivaura custody service PIN Online brokerage account with the

Sole Broker-Dealer

Given that both the LuxDeco-Nivaura and Overstock-tØ models purport to confer legal title on

investors via their public addresses yet, by the same token, keep private keys out the hands

of the investors, characterisation of the capacity in which the relevant intermediary holds the

private keys remains the outstanding question. In the case of LuxDeco-Nivaura, if legal title

to the bonds vests in the investor, the only solution can be that the custodian holds as bailee.

In the Overstock-tØ model, the fact that private keys are held by Overstock, Pro Securities, as

well as the Sole Broker-Dealer proves more difficult to analyse. In the case where the three

entities each hold copies of the same private key, the Sole Broker-Dealer, at least, is likely to

hold as an agent by virtue of his position as a broker-dealer. In such case, it may well be that

the agency encompasses holding as bailee,105 or at least with some fiduciary obligation as an

agent. In respect of Pro Securities ATS and Overstock holding private keys on behalf of

investors, there is a concerning lack of any documentation or formal agreement as to the basis

105 Bailment and agency often coincide; see generally N Palmer, ‘Bailment’ in A Burrows (ed), Oxford Principles of English Law: Private Law (3rd ed, OUP 2017), [16.20].

108

upon which they so hold. In these circumstances where the investor is conferred legal title, it

is submitted that a gratuitous bailment106 may be inferred.

This Part also explored the issue of personal liability where traditional intermediaries used in

the performance of payment obligations which comprise the economic value of the financial

property, such as paying agents and trustees, are replaced by smart contract code. This

remains inconclusive but it was submitted that the matter is, in the context of financial assets,

better analysed as an aspect of the commercial features of a securities issue, rather than one

which goes to its form.

106 N Palmer, ‘Bailment’ in A Burrows (ed), Oxford Principles of English Law: Private Law (3rd ed, OUP 2017) [16.35] et seq.

109

4.3. Intermezzo: The Role of the Financial Markets Infrastructure

CSDs Forced to Defend their Existence in a DLT World…

Jonathan Watkins1

The very real potential for direct issuer-investor relationships using DLT has raised ‘obvious’2

questions as to the role of traditional intermediaries and the financial markets infrastructure

more generally. In November 2018, Joseph Lubin, founder of ConsenSys and co-founder of

Ethereum, was reported to have said:

A CSD is a conceptual construct and has a physical manifestation because that’s

what we know how to build. It can continue to exist as a conceptual or logical

construct, but it can take on a decentralised implementation. Global financial

institutions can get together, define a protocol and build that system, but there

doesn’t need to be a central physical clearing house or implementation of a central

database; it can be realised as a series of nodes on a decentralised network.3

On the other hand, the case studies of direct issuer-investor issues show that there is still

some way to go before this ideal is likely to be realised. Those at Nivaura remain pragmatic

about the current limitations of smart contract technology and consider, as a result of such

limitations, that it would be commercially unviable to use smart contracts to facilitate the entire

life-cycle of securities in large-scale transactions; at least in the short to medium term.4 In

respect of Overstock, on 1 March 2018, the company announced that it was cooperating with

the SEC following its request for voluntary disclosure of certain documents for the purposes

of an investigation into an ICO issued by tZERO.5 A class action against Overstock was

1 J Watkins, ‘CSDs forced to defend their existence in a DLT World (The TRADE Crypto, 1 November 2018) <“https://www.thetradenewscrypto.com/csds-forced-defend-existence-dlt-world/ > accessed 7 June 2019. 2 International Securities Services Association (ISSA), ‘Infrastructure for Crypto-Assets: a Review for Infrastructure Providers’ (October 2018), 11. 3 Watkins (n 1). 4 R Cohen et al, ‘Automation and Blockchain in Securities Issuances,’ (2018) March JIBFL 144, 147; Telephone call between R Cohen and author 31 May 2019. 5 t0.com Inc, Amended, Supplemented, and Restated Offering Memorandum dated 1 March 2018 (SEC Ex-99.1, made available by Overstock by way of voluntary disclosure), 9.

110

subsequently filed in the US District Court of Utah, alleging that Overstock had made false

and/or misleading statements and/or failed to disclose that: (i) “Overstock’s coin offering was

highly problematic and potentially illegal;” and (ii) “the company’s Medici business was

haemorrhaging money.”6 The action was discontinued in August 2018,7 however, the case is

worth noting for the strong link between the allegation of false and/or misleading statements

and the position ultimately taken by the International Securities Services Association (‘ISSA’) as to the role of the financial markets infrastructure. The ISSA acknowledges that Nakamoto’s ideal of decentralised trust taken at its most

theoretical extreme would indeed obviate the need for any intermediaries at all, but has conceded this with a significant caveat:

In theory, a blockchain of the classic variety obviates the need for any centralized

intermediary or governing authority to police and facilitate transactions, by providing an immutable, digital audit trail of transactions that all members of the

network agree is true. In short, evangelists for the classic version of blockchain argue that it eliminates the need for trust. As Satoshi Nakamoto put it in his original paper outlining how Bitcoin would work, ‘the main benefits are lost if a trusted

third party is still required.’8

Citing a study by PwC, the ISSA continues, not without some irony, that a lack of trust amongst

industry participants remains the most significant obstacle to a truly decentralised financial

markets infrastructure which obviates the need for trust.9

Such irony is, perhaps, not surprising, given the substantive nature of a financial asset as

underpinned by an obligation. The very economic value of such assets derives from the future

6 Morris and Rossetti, Individually and on Behalf of All Others v Overstock.com.Inc. and Ors, Class Action Complaint for Violations of Federal Securities Law, Demand for Jury Trial (Filed 29 March 2018), para 4. Reported by R Kahn, ‘Shareholder Class Action’ (Court House News, 30 March 2018) < https://www.courthousenews.com/wp-content/uploads/2018/03/SCA.Overstock.pdf > accessed 4 February 2019. 7Morris and Rossetti, Individually and on Behalf of All Others v Overstock.com.Inc. and Ors, Notice of Voluntary Dismissal < http://securities.stanford.edu/filingsdocuments/1065/O00_03/2018330_f01k_18CV00271.pdf > last accessed 19 June 2019. 8 ISSA (n 2), 12. Emphasis added. 9 ISSA (n 2), 12-13.

111

performance of an obligation undertaken – or in the terms of classical contract law, ‘promised’

– at some point in the past. The considerations of trust that consequently arise are simply

distinct from those with which Nakamoto was concerned. The ‘Byzantine Generals’ problem,10

which Bitcoin was designed to overcome, is concerned with the extent to which proofs given

today of messages sent in the past can be trusted as authentic by a dispersed network of

independent peers without recourse to a trusted third party. By contrast, the owner of a

financial debt is concerned with whether the debtor can be trusted to make good on a promise

given in the past to do something in the future. These raise two very different models of trust

and obviating the need for trust in the former context does not necessarily obviate the need

for trust in the latter.

In the future-oriented property model, the key unknown is whether the debtor’s obligation will,

actually, come to be performed. If, as Aesop warned some millennia ago, not to count one’s

chickens before they are hatched, the entire object of English financial law at its most basic is

to ensure that, whatever happens, the chickens are at least effectively hatched. This

preoccupation can be traced through the development of classical contract law from the older

action of assumpsit through the late 18th and 19th centuries to accommodate a shift from a

land-based economy to modern capitalism.11 Nowhere in this development is the near-

obsession with mitigating the risk of future unknowns more clearly demonstrated than in the

doctrine of expectation damages for breach of contract. Parke B’s now-classic formulation in

Robinson v Harman12 was, in 1848, without precedent in the common law,13 designed, as it

was, to compensate loss by placing the plaintiff “so far as money can do it…in the same

situation, with respect to damages, as if the contract had been performed.”14 Such a measure

of damages means that in English law, to use Professor Atiyah’s incisive riposte to Aesop’s

fable: “a plaintiff with an egg is entitled to be treated as though he has a chicken.”15

10 Part 3.1.4 at 32 et seq above. 11 O Kahn-Freud illustrates the role for contract law: “it does not matter what the thing is: it may be a block of flats, an agricultural estate, a factory, or so many South African gold shares. The property object has become ‘capital.’ But the law of property cannot by itself endow its object with the nature of capital. It must be assisted by complementary instructions most of which are found in the law of contract”, in K Renner Institutions of Private Law and their Social Functions (Routledge & Keagan Paul, 1949, reprint ed 1976), 27 (emphasis added); also J Commons: “Modern capitalism begins with the assignment and negotiability of contracts,” J Commons, The Legal Foundations of Capitalism (The Macmillan Company 1924), 253. 12 (1848) 1 Ex Rep 850, 154 ER 363. 13 See generally PS Atiyah, The Rise and Fall of Freedom of Contract (Clarendon Press, Oxford 1979, 1986 (printing)), 414; AWB Simpson, ‘Innovation in Nineteenth Century Contract Law’ in Legal Theory and Legal History: Essays on the Common Law (The Hambledon Press, London 1987). 14 Robinson v Harman (1848) 1 Ex 850, 855; 154 ER 363, 365. 15 Atiyah, (n 13), 446.

112

Given the essential uncertainty surrounding any promise to do something in the future, it is

clear why modern finance speaks in terms of risk; why, as early as 2007, Joanna Benjamin

described the modern financial markets infrastructure as primarily a way of managing risk.

Eschewing a focus on money, one of Professor Benjamin’s central arguments in respect of

financial law was that “all financial transactions comprise one or more positions […] and the

effect of a position to transfer risk from one person to another.”16 Thus, “the business of

financial institutions is to take risks in exchange for rewards”17 in:

… a synthetic approximation of a controlled and known future [… ] created through

a system of legal rights and obligations that adjust to the future as it unfolds.

Misfortune will not be left lying where it may fall but prospectively diverted from

protection buyer to risk taker.18

Hence:

The financial system does not reduce risk; it merely diverts it from person to

person. There is no choice as to the occurrence of loss events, but only as to who

will pay for them, and someone always pays.19

It has therefore been argued that the modern financial markets infrastructure has moved well

beyond the technical efficiencies of paperless securities ownership, but has evolved into the

‘fullest development’20 of the modern risk-management project that is the “colonisation of the

future.”21 This is echoed in the ISSA’s position that, working within a framework of laws and

16 J Benjamin, Financial Law (OUP 2007), [1.25]. At [1.26] Professor Benjamin gives four reasons for emphasising risk rather than money: “(1) risk offers a sector-neutral term, given that not all financial transactions transfer money but all transfer risk; (2) money predominantly now takes form as credits standing to a bank account, rather than physical assets such as coins, and credits to a bank account necessarily involves credit risk of the bank; (3) with the rise of the derivatives market, risk management is now arguably the dominant economic function of the financial markets; (4) traders themselves speak in terms of risk: “originating risk” into the capital markets, not raising money from it” “not invest in funds, but buy ‘risk participations.’” Professor Benjamin therefore argues it may be time to “stop referring to the providers of financial market capital ‘capitalists’ (with that term’s 19th century evocation of top hats, spats, and cigars). Today, we have risk takers (and my young colleagues will tell me how risk takers dress).” 17 Benjamin (n 16), [1.28]. 18 Benjamin (n 16), [1.29]. 19 Benjamin (n 16), [1.31]. 20 Benjamin (n 16), [1.29]. 21 A Giddens, Modernity and Self-Identity, (1991, Polity Press),117 in Benjamin (n 16), [1.29].

113

regulations, “the market infrastructure is currently organised and structured to mitigate the risk

inherent in any financial market.”22

If it is accepted that financial assets bear an inherent risk in that a creditor may be prevented

from receiving the value associated with the debtor’s due performance of his promise, the

function of the financial markets infrastructure becomes clearer. A survey of some of its core

pillars demonstrates that the concerns surrounding trust in respect of a financial asset are far

from recent developments. Rather, they have attracted regulatory and legislative attention for

almost as long as transferrable promises have been recognised as a source of economic

value.

The most obvious risk – dishonesty or fraud on the part of the issuer when giving the promise

– has typically been mitigated through listing rules and disclosure requirements. In the UK,

the earliest such requirements are found in the Joint Stock Companies Act 1844, which is

widely considered the genesis of all modern UK company statute law. This Act required

issuers which had duly completed the provisional registration requirements to file a

“prospectus or circular, handbill or advertisement” before the issue of capital could be

advertised to the public.23 Requirements as to the contents were prescribed in the Companies

Act 1900, and by the time of the 1948 amendments, it was recognised that the legislative rules

on disclosure were “partly a matter of assimilating statute law to the rather more advanced

rules of the Stock Exchange.”24

Today, disclosure and listing requirements are now derived largely from EU legislation;

primarily the Market Abuse Directive,25 Prospectus Directive26 and Transparency Directive.27

22 ISSA (n 2), 5. Emphasis added. 23 Joint Stock Companies Act 1844 s 4. 24 MS Rix, ‘Company Law: 1844 and Today’, (1945) 55 (218/219) The Economic Journal 252, 247-248. 25 Directive 2014/57/EU of the European Parliament and of the Council of 16 April 2014 on criminal sanctions for market abuse [2014] OJ L 173/179. 26 Directive 2003/71/EC of the European Parliament and of the Council of 4 November 2003 on the prospectus to be published when securities are offered to the public or admitted to trading and amending Directive 2001/34/EC [2003] OJ L 345/64. 27 Directive 2013/50/EU of the European Parliament and of the Council of 22 October 2013 amending Directive 2004/109/EC of the European Parliament and of the Council on the harmonisation of transparency requirements in relation to information about issuers whose securities are admitted to trading on a regulated market, Directive 2003/71/EC of the European Parliament and of the Council on the prospectus to be published when securities are offered to the public or admitted to trading and Commission Directive 2007/14/EC laying down detailed rules for the implementation of certain provisions of Directive 2004/109/EC [2013] OJ L 294/13.

114

These are implemented in the UK mostly through amendments to the Financial Services and

Markets Act 2000 and three sets of rules made pursuant to those amendments28 which fall

within the regulatory remit of the FCA. Of most present relevance is the criteria to be applied

by the FCA when approving a prospectus: whether it includes the necessary information to

enable investors to make an informed assessment of the “assets and liabilities, financial

position, profits and losses, and prospects of the issuer of the transferable securities and of

any guarantor.”29

Fraud and dishonesty in the secondary markets have an even longer history of attracting

legislative concern. On 25 November 1696, one Mr Blathwaite, of the Royal Commission

appointed to oversee trade, reported to the House of Commons on the danger of unlicensed

stock-brokers, known as stock-jobbers:

The pernicious Art of Stock-jobbing hath, of late, so wholly perverted the End and

Design of Companies and Corporations, erected for the introducing, or carrying

on, of Manufactures, to the private Profit of the first Projectors, that the Privileges

granted to them have, commonly, been made no other Use of, by the First

Procurers and Subscribers, but to sell again, with Advantage, to ignorant Men,

drawn in by the Reputation, falsly [sic] raised, and artfully spread, concerning the

thriving State of their Stock: Thus the first Undertakers, getting quit of the

Company, by selling their Shares for much more than they are really worth.30

Such concerns led to the enactment in 1687 of the ‘Act To Restrain the number and ill Practice

of Brokers and Stock-Jobbers.’ 31 This imposed registration requirements, caps on

registrations, admission fees, bonds, fines for unlicensed brokers and all who knowingly used

their services, and the requirement to record all trades in a register.32 The Act was a popular

statute; extended for a further eight years beyond its original intended expiry in 1700.33

28 The Listing Rules, Prospectus Rules, and the Disclosure and Transparency Rules are colloquially known collectively as the LPDP Rules. 29 Financial Services and Markets Act 2000 s 87A. Emphasis added. 30Journal of the House of Commons, (25 November 1696) 11 House of Commons Journal: 25 1693-1697 (London, 1803), 593-598. British History Online < http://www.british-history.ac.uk/commons-jrnl/vol11/pp593-598 > accessed 5 April 2019. 31 8 and 9 Wm III, c. 32. 32 SR Cope, ‘The Stock Exchange Revisited: a New Look at the Market in Securities in London in the Eighteenth Century,’ [1978] 45 (117) Economica, New Series 1, 2. 33 Cope (n 32), 2-3.

115

More recently, trust between traders inter se in the secondary markets was considered by the

Court of Appeal in W Nagel (a Firm) v Pluczenik Diamond Company NV.34 In respect of the

nature of an exchange, Leggatt LJ (with whom the other members of the Court agreed) said

this:

I am unable to agree with the judge [below] that an exchange in its historical and

commercial sense is simply a place for sales to take place. No one, for example,

would reasonably describe a supermarket as an exchange. Nor are the facts that

the class of persons able to buy is restricted and the process of selling regulated

sufficient to make a place where sales take place an exchange. An auction house,

for example, where only people who satisfy specified criteria are permitted to bid

and where sales are conducted in accordance with the auctioneer's rules would

not be regarded in the commercial world as an exchange. The nature of an

‘exchange” as I believe the term would generally be understood, is a place where

trading takes place among members of the exchange and subject to its rules.35

Such trading on an exchange was further found to be:

…of a nature where the identity of a counterparty is largely irrelevant. Sales are

made to whoever is able and willing to pay the agreed price. Considerations of

customer or supplier loyalty and goodwill are of little or no significance. Indeed,

the rules of an exchange are usually intended to promote this by providing

confidence that any contract made between members of the exchange will be

honoured.36

Thus, the exchange functions as a convenient solution to the problem that traders cannot trust

each other to perform their obligations without incurring significant tasks in due diligence.

Hence, rather than each trader having to form an opinion on every counterparty to a trade

individually, all traders agree to trust the rules of the exchange in a quasi-Hobbesian social

contract.

34 [2018] EWCA Civ 2640. 35 W Nagel (a Firm) (n 34), [76]. Emphasis added. 36 W Nagel (a Firm) (n 34), [80]. Emphasis added.

116

CCPs, on the other hand, are a more recent development, and are less concerned with fraud

and dishonesty but simply with the fact of potential failure of the obligor to perform. Standing

between parties to a trade through novation, clearing through a CCP promotes further trust

and confidence that a contract will be honoured by minimising general counter-party risk once

a trade has been agreed. In the EU, following the G20 Pittsburgh recommendations in 2008,37

use of a CCP is mandatory for OTC derivatives38 which, as privately negotiated contracts, are

recognised as “creat[ing] a complex web of interdependence which can make it difficult to

identify the nature and level of risks involved.”39 Here, however, the role of the intermediary

strays somewhat into macro-economics and systemic risk.

In the present context of ownership rights in financial assets, no intermediary holds as

significant a role as the custodian. Global custody traditionally provided “a service whereby a financial institution assumes responsibility for the safekeeping and administration of its client’s international portfolio,” 40 and was typically associated with the needs of large institutional investors. Unable to access, or it being impractical to access, local facilities in each jurisdiction in which it held assets, institutional investors delegated to global custodians core safekeeping, settlement, and basic, customary services such as foreign exchange. As noted in Part 2.2.2, since the shifts to issuing securities in dematerialised and immobilised

form, custodians are no longer an optional measure for those who wish to delegate the

burdens of asset administration, but a necessary feature of modern securities ownership.41

Investors, whether they wish to or not, are obliged to hold securities indirectly through a

custodian or some other account holder of the CSD. In addition, with the rise of more complex investment products and fragmentation of functions in the capital markets, custodians have taken on a new role in mitigating the conflicts of interest which arise when one party instructs and authorises another to take active strategic control and management of the first party’s financial assets. In this context, custody is recognised as “making money

safe, because a custodian separates exchanging the asset from holding the asset and

37 Regulation (EU) No 648/2012 of the European Parliament and of the Council of 4 July 2012 on OTC derivatives, central counterparties and trade repositories [2012] OJ L 201/1 (‘EMIR’), Recital 5. 38 EMIR (n 37), Art 4(3). 39 EMIR (n 37), Recital 4 40 M Yates and G Montagu, The Law of Global Custody: Legal Risk Management in Securities Investment and Collateral (4th ed, 2013, Bloomsbury), [1.1]. 41 Part 2.2.2 fn 64 and text at 16 above.

117

distributes responsibility across different parties.”42 Thus, in the EU, fund managers are required to appoint an independent depository to hold fund assets for safekeeping43 using specified methods44 on behalf of the fund and its investors. Depositories are also themselves subject to liability to the fund investors and third parties for any loss of financial assets held in custody.45 Similar provisions are in force in the US under the Investment Companies Act 1940.46 Of the various custodian entities, the Common Depository/International Central Securities Depository pair, and Central Securities Depository (‘CSD’), are of particular significance due to their position as top-tier intermediaries in the current system of securities ownership. Practices adopted – or DLT-enabled removals – at this level necessarily have consequences for those entities lower down in the chain, such as sub-custodians and the ultimate investor and economic creditor. The broader case for and against removing the CSD and replacing it with DLT will therefore be considered.

4.3.1. The Role of a CSD

CSDs perform a number of key functions in the financial markets infrastructure. In the EU,

the Central Securities Depositories Regulation (‘CSDR’) recognises three core functions of a

CSD: (i) the initial recording of securities in a book-entry system (the ‘notary service’); (ii)

providing and maintaining securities accounts at the top tier level (the ‘central maintenance

service’); (iii) operating a securities settlement system (the ‘settlement service’).47 Thus:

42 R Verderosa, in J Watkins, Custody’s Big Moment: Cryptocurrency Custody,’ (Global Custodian Summer 2018 ), 31. 43 Directive 2014/91/EU of the European Parliament and of the Council of 23 July 2014 amending Directive 2009/65/EC on the coordination of laws, regulations and administrative provisions relating to undertakings for collective investment in transferable securities (UCITS) as regards depositary functions, remuneration policies and sanctions [2014] OJ L 257/186 (‘UCITS V’), Art 22(1); Directive 2011/61/EU of the European Parliament and of the Council of 8 June 2011 on Alternative Investment Fund Managers and amending Directives 2003/41/EC and 2009/65/EC and Regulations (EC) No 1060/2009 and (EU) No 1095/2010 [2011] OJ L 174/1 (‘AIFMD’) Art 21(4) and (10). 44 UCITS V (n 43), Art 22(5); AIFMD (n 43) Art 21(8). 45 UCITS V (n 43), Art 24; AIFMD (n 43), Art 21(12)-(15). 46 SEC Rule 17f-4 [17 CFR 270.17f-4] under the Investment Companies Act 1940 15 USC §§ 80a-1–80a-64. 47 Regulation (EU) No 909/2014 of the European Parliament and of the Council of 23 July 2014 on improving securities settlement in the European Union and on central securities depositories and amending Directives 98/26/EC and 2014/65/EU and Regulation (EU) No 236/2012 [2014] OJ L 257/1 (‘CSDR’), Annex, Part A.

118

Taking into account different business models, a CSD should be defined by

reference to certain core services, which consist of settlement, implying the

operation of a securities settlement system, notary and central securities accounts

maintenance services. A CSD should at least operate a securities settlement

system and provide one other core service.48

The rationale for these requirements is then set out by reference to the main role played

by a CSD:

This combination is essential for CSDs to play their role in securities settlement

and in ensuring the integrity of a securities issue.49

The CSDR also prescribes that CSDs provide for book-entry method of settlement and

ownership, requiring issuers established in the EU or who have issued transferrable securities

to trading venues to “arrange for such securities to be represented in book-entry form.” 50

Once admitted to trading venues, book-entry form in a central securities depository is required

to enable settlement.51

4.3.2. Settlement Finality

One significant property issue to which the ISSA draws attention is settlement finality; the point

at which a buyer becomes legally the owner of any securities purchased and the seller

becomes owner of the purchase price in cash. Under the CSDR, 52 the point of settlement

finality is a construct left to CSDs to define; the only requirement is that they do so in

accordance with the Settlement Finality Directive (‘SFD’).

48 CSDR (n 47), Recital 26. Dermot Turing argues that these core functions of a CSD can be reduced substantively to only two: the “root-of-title function” and the ‘settlement function’: “The root-of-title function is a combination of the notary and safekeeping roles described, but it is misleading to suggest that these could be split apart. The issuer-facing aspect of maintaining the integrity of the issue, described as the ‘notary function’ is inseparable from safekeeping in the sense of providing a register of entitlement to the securities credited to accounts of CSD participants. Another safekeeping function may be the physical holding of a document, for example where title to the securities depends on it nut in such a case this is also a necessary component of the root of title role, and not somehow to be treated as separate”, D Turing, Clearing and Settlement (2nd ed, Bloomsbury Professional 2016), [2.17]. 49 CSDR (n 47), Recital 26. Emphasis added. 50 CSDR (n 47), Art 3 (1). 51 CSDR (n 47), Art 3(2). 52 CSDR (n 47), Art 39(2).

119

Enacted at a time when cross-border transactions were increasing, the SFD recognised that,

after a certain point, insolvency proceedings should not have a retroactive effect on the rights

and obligations of participants in a securities settlement system 53 which arise when a

participant instructs the settlement system to transfer some of its assets to another. Such

instructions are known in the SFD as ‘transfer orders’ and cannot be revoked after a point in

time defined by the settlement system.54 Such prohibition is effective even in insolvency;

transfer orders and netting provisions remain legally enforceable and binding so long as they

were entered into the settlement system before the opening of the insolvency proceedings.55

Thus, participants of a CSD settlement system benefit from the legal certainty that, after a pre-

defined point following the giving of a transfer order, the seller owns the purchase price in cash

and the buyer owns the securities.

It is worth noting that the SFD does not prescribe the point at which CSDs are to treat a transfer

order as irrevocably ‘entered’ into the system; rather, a CSD is merely to “define the moment

of entry of a transfer order into a system” in its rules of operation, with due regard to any

applicable conditions laid down in national law.56 The point at which settlement becomes

legally binding is, thus, merely a construct and, in theory, could apply to any point in the

clearing process. By contrast, the ISSA points out that settlement on a non-permissioned

blockchain is problematic because “settlement is not final but probabilistic: it simply becomes

more final the more times the transaction is committed to the ledger.”57 The ISSA further cites

several potential obstacles to consensus as to any given transaction and its inclusion on the

blockchain: forks, Sibil attacks, failure of consensus conditions such as voting by majority,

cheating, or delay due to network latency.58

Though compelling as a proposition, it is submitted that consensus failure or the fact that

settlement is “not final but only probabilistic” should not necessarily be considered an obstacle

53 Directive 98/26/EC of the European Parliament and of the Council of 19 May 1998 on settlement finality in payment and securities settlement systems [1998] OJ L 166/45 (‘SFD’) Recital 16. 54 SFD (n 53), Art 5. 55 SFD (n 53), Art 3. Judicial proceedings are defined in Art 6.1 as which is defined as the moment when the relevant administrative of judicial authority hands down its decision as to the insolvency petition. 56 SFD (n 53), Art 3(3). 57 ISSA (n 2), 19. 58 ISSA, ‘Distributed Ledger Technology: Principles for Industry-Wide Acceptance’ (June 2018), 34 < https://www.issanet.org/e/pdf/2018-06_ISSA_DLT_report_version_1.0.pdf > accessed 28 October 2018.

120

to settlement finality. Bitcoin may be an unpermissioned network, however, there is already

an agreed ‘construct’ as to the point of settlement finality: a transaction is in practical terms

and by convention considered irrevocable after six confirmations, which takes into account

any potential delays. For example, simple forks, which typically occur when two winning

blocks are near-simultaneously propagated when extending the blockchain, are relatively

common and unproblematic: the fork is typically resolved within one block, with any

transactions on the orphan block released into the mempool to be included in the next block.59

Deliberate fraud and 51% attacks, although attracting more serious consequences, are less

likely to occur given the extent to which it is computationally infeasible after six blocks to

reverse a transaction committed to the blockchain. As the network’s hashing power continues

to grow, Mr Antonopolous states that a malicious attack now would require “enormous

investment and covert planning” by a “well-funded, most likely state-sponsored, attacker.”60

Amongst the Bitcoin community, therefore, the conventional advice is that: one confirmation

suffices for small payments less than US$1,000; 3 confirmations suffice for payments

US$1,000-$10,00; 6 confirmations are sufficient for US$10,000-$1,000,000; 60 confirmations

suggested for payments greater than $1,000,000 (although less would probably still be safe).

Crucially, most exchanges require users to wait 3 confirmations before Bitcoin can be spent.61

Given that settlement finality under the SFD and CSDR is a construct determined by the CSD

upon which all settlement participants agree, it is submitted there is no reason why settlement

finality based on convention and probability should be any less valid in law. This is all the

more so, given that in both cases, challenges to settlement finality are resolved in the same

way.

The CSDR expressly recognises that the SFD should not prevent participants or third parties

from pursuing remedies to which they may be entitled in law in respect of transfer orders which

have been entered into a settlement system.62 Pursuing such claims, which may sound in

fraud or merely arise from technical error, is not hampered by the operation of the SFD insofar

as the transfer order is not revoked nor netting unwound. In practice, the remedy thus sought

59 A Antonopoulos, Mastering Bitcoin: Programming the Open Blockchain (2nd ed, O’Reilly Media 2017), 468. 60 Antonopoulos (n 59), 256. 61 Buy Bitcoin Worldwide Website < https://www.buybitcoinworldwide.com/confirmations/ > accessed 4 April 2019. 62 SFD (n 53), Recital 13; CSDR (n 47) Recital 43.

121

will most likely be satisfied by the coercive power of the court over the defendant, probably in

the form of an order requiring him effect a new transfer in compensation to reverse not the

transaction itself, but its effect. This is not technically revocation of a transfer order entered

into a settlement system nor rectification; to this extent, a CSD’s book-entry records is just as

immutable as a blockchain as a matter of law, if not as a matter of fact.

By parallel in the Bitcoin network, if Alice wished to challenge a transaction and the related

security of ownership over some chunk of UTXO currently attributed to Bob’s public address,

or Alice’s transaction is rejected by the mining nodes, thereby depriving Bob in both cases of

the benefit and security of settlement finality, such challenge to the blockchain would most

likely not involve any right to rectification of the blockchain itself. Rather, and as with the

CSDR, the likely remedy is for Alice to apply to the courts to compel Bob to reverse the effect

of the transaction by means of a new transaction altogether. The only difference with a public

blockchain is the difficulty of obtaining a court order for the new transaction in satisfaction of

whatever remedy is sought against a pseudo-anonymous defendant.

On the other hand, where Bob is deprived of settlement finality due to a 51% attack, it is

submitted that it is not appropriate to treat such risk as a characteristic of any particular

clearing technique or method of settlement. Rather, such risk represents a fundamental

breakdown in the system itself, comparable to a targeted and malicious attack on the software

underpinning a CSD’s settlement systems or into a custodian’s vaults. The argument that a

public blockchain cannot be considered as enabling settlement finality because there is the

chance of 51% attack is, it is respectfully submitted, akin to arguing that settlement by

Euroclear’s system is not final, but merely probabilistic, because there is a chance that

Euroclear’s IT systems could be hacked, or that custody of assets in the vaults of the Bank of

New York Mellon is not secure, but only probably secure, because thieves could break in. It is

submitted that comparing the potential for a 51% attack to a simple technical error in the

settlement process is neither fair nor accurate.

To some extent, these issues are largely theoretical given that ISSA’s concerns regarding

probabilistic settlement finality is expressly limited to unpermissioned networks. The ISSA

itself recognises that the role of a CSD in a DLT-oriented financial markets infrastructure will

be limited to permissioned networks,63 and in such networks, these issues simply do not arise.

63 ISSA (n 2), 8.

122

A DLT-based CSD will be free – if not required by the CSDR – to define authoritatively the

moment of finality in this novel method of clearing and settlement. All participants will be

identified and subject to admission criteria, thereby facilitating the identification of a potential

defendant. Although, therefore, the nature of a permissioned network resolves the problem

of pseudo-anonymity associated with public networks, the hierarchies inherent in

permissioned networks raise other issues.

4.3.3. Double Issuance

If settlement finality under the settlement function of a CSD operates so as to promote certainty

and trust between traders inter se, the notary function significantly enhances the trust between

the issuer and investor; described as an “essential tool to control the integrity of an issue,

hindering the undue creation or reduction of issued securities.”64 To this end, CSDs are

required to conduct reconciliation measures, at least daily, to verify that the number of

securities constituting a securities issue submitted to it is equal to the sum of securities

recorded on the securities or owner accounts of the participants of the securities settlement

system operated by or maintained by the CSD.65 Unlike lower-tier custodians, CSDs are

prohibited from securities overdrafts, debit balances or securities creation in a securities

settlement system operated by a CSD.66

Such notary protections are absent in direct issuer-investor models, and the ISSA argues that

this is one area in which the existing market infrastructure can be usefully adapted for the

crypto market.67 Given that CSDs already guarantee the “integrity” of a securities issue by

“making it difficult for issuers or third parties to damage the interests of investors by creating

additional securities or reducing the number of securities in circulation,” CSDs can adapt this

function to “obviate the “double issuance” risk in ICOs by matching the number of tokens in

issue with the number of tokens held in the accounts on the distributed ledger.”68

This however assumes that double issuance is indeed a risk - or even a possibility - within the

networks which underpin tokens issued on a blockchain. Bitcoin itself was designed to

eliminate the ‘double-spend’ problem and is pre-programmed to simulate diminishing returns

64 CSDR (n 47), Recital 2. 65 CSDR (n 47), Art 37(1). 66 CSDR (n 47), Art 37(3). 67 ISSA (n 2), 17. 68 ISSA (n 2), 17.

123

in respect of mineable new Bitcoins, which is capped at 21 million.69 Thus, the maximum

amount of new Bitcoins mined with each new block halves every 210,000 blocks

(approximately every four years); by some time in 2140, therefore, no new Bitcoins will be

created by miners who will, from that point, be incentivised by transaction fees only.70 Within

the Bitcoin network, double-issuance of Bitcoin is, therefore, impossible. In respect of

Ethereum, no cap exists, however, the total supply of Ether and its rate of issuance was fixed

by reference to its 2014 pre-sale figures: 60,000,000 Ether created for contributors to the pre-

sale; 12,000,000 created as a development fund; and the annual issuance capped at

18,000,000 per year.71

Bitcoin and Ether are, however, first and foremost a cryptocurrency and utility token and,

therefore, unlikely to be used for tokenising traditional financial assets. The notary services

of a CSD are therefore irrelevant in this context. Bitcoin coloured coins and Ethereum tokens

are more directly on point, however, in these cases, any alteration to the set of coloured coins

or of the ECR20 tokens will be visible as a recorded change in state. In both the LuxDeco-

Nivaura and Overstock-tØ issues, anyone can verify the internal records of the relevant

systems against the public blockchain.72 In this regard, the LuxDeco-Nivaura model provides

the more security, given it relies on the public network as the definitive ledger, whereas the

Overstock-tØ issue relies on its own proprietary ledger, which is broadcast to the Bitcoin

network. In both cases, however, public visibility of changes in state significantly reduces the

risk of double issuance or some other form of manipulation of an issue; transparency acts as

a broader deterrent for dishonest issuers. As with any deterrent, however, the risk is not

entirely eliminated and is particularly heightened where there is significant potential for

conflicts of interest between the issuer and software developer, or operator of the network.

69 Antonopoulos (n 59), 473. 70 Antonopoulos (n 59), 473 et seq. 71 On 1 April 2018 Ethereum founder, Vitalik Buterin, posed the question of whether a cap of 120,204,432, “or exactly 2x the amount of Ether” sold in the 2014 sale, should be implemented in a forthcoming software change. To date, no such cap has been imposed. Ethereum Github Website < https://github.com/ethereum/EIPs/issues/960 > accessed 18 June 2019. 72 Overstock Inc, Prospectus dated 9 December 2015 (Filed 11 December 2015), 36 < http://investors.overstock.com/static-files/aeb7115e-cc0c-482a-9f44-69eade872e53 > last accessed 4 June 2019. In the case of LuxDeco, this is implicit in using the blockchain as the definitive register.

124

4.3.4. Conflicts of Interest

The ISSA takes the position that, in permissioned networks, the questions of “who is admitted

to a network, who has access to which information on the network and how the activity of the

network is policed”73 raises governance issues in that:

…there is no separation between the entity responsible for establishing and

monitoring the rules by which the network on which the crypto-assets are issued

and traded are run and the operation of the network itself. In most cases, the roles

of network governor and network operator are fulfilled by the same entity. This

creates a conflict of interest.74

Going one step further, where issuers are directly involved and hold commercial interests in

developing and operating permissioned networks for the issue of their own securities, there is

a further dimension to and exacerbation of the original problem of fraud or dishonesty on the

part of an issuer when making its promises to potential investors. It is submitted that this is

one key assumption which a direct, peer-to-peer trading environment of the type Mr Lubin

envisions appears to overlook: whether an investor is actually able to trust the issuer, not

merely on its initial promises, but also into the future in performance of those promises.

Although both the Nivaura and ProSecurities platforms are ultimately based on a public

network and both enable independent verification of holdings, both cases do reflect some of

the ISSA’s concerns. In the case of Nivaura, the conflict-of-interests risk is arguably mitigated

by the fact that the developer and licensor of the system, Nivaura, is distinct from LuxDeco as

the issuer, and independent Custodians will be used outside the sandbox context to reconcile

internal records of the Nivaura platform with the underlying public blockchain. Given the clear

division of responsibilities between issuer and operator, at the very least, active collusion

would be required for the manipulation of issues.

The Overstock issue, however, is more problematic due to the close links between the issuer,

developer of the software, and the operator of the trading venue; investors simply have no

guarantee that the software itself can trusted as having been programmed not to manipulate

73 ISSA (n 2), 8. 74 ISSA (n 2),15.

125

holdings or, if having been programmed honestly at issue, will not later be manipulated. This

is significant, given the way in which the Pro Securities ATS software interacts with the Bitcoin

network: essentially, it generates the necessary trading information on the tØ software, which

is embedded into a Bitcoin transaction. Although the proprietary ledger can be verified against

the blockchain, this is presumably not much use unless investors can trust the initial data

generated and broadcast to the network. Coupled with the facts that (i) Overstock and its

close subsidiary Pro Securities LLC both hold private keys where the investors themselves do

not; and (ii) the tZERO group relies heavily on Overstock for funding, the risks of conflicts of

interest and dishonesty are significant to such an extent that it is not easy to dismiss the risks

inherent in issuers being too closely connected with the developers and operators of a DLT-

based network designed for their own securities.

4.3.5. Conclusions

The ISSA’s ultimate conclusion is that, given the inherent nature of risk in the financial

markets, the market infrastructure exists, has always existed, and can continue to exist to

create “a safe and efficient environment for companies to issue, investors to invest,

marketplaces to provide facilities for trading and financial intermediaries to service these

assets for their customers.”75 Whilst, therefore, the “market infrastructure roles and pieces of

infrastructure in support of crypto-assets are likely to be different from those in today’s

securities markets, ultimately they will seek the same objective.”76 Thus, for the ISSA, the

provision of these new kinds of market infrastructure in support of crypto assets fall ‘naturally’

within the remit of existing infrastructure entities.77 The European Securities and Markets

Authority (‘ESMA’) is of a similar view:

Importantly, ESMA sees as unlikely for DLT to eliminate the need for financial

market infrastructures, such as Central Counterparties (‘CCPs’) and Central

Securities Depositories (‘CSDs’). Yet, ESMA realises that DLT may render some

processes redundant or change the role of certain intermediaries through time. On

the one hand, some regulatory requirements could become less relevant, while,

75 ISSA (n 2), 5. 76 ISSA (n 2), 5. 77 ISSA (n 2), 5.

126

on the other hand, additional requirements may be needed to mitigate emerging

risks.78

It is submitted that, although many of the risks identified by the ISSA in a DLT-enabled market

infrastructure are not in fact problematic, the argument for an independent operator of

permissioned networks for DLT-based securities issues is convincing and should be

endorsed. This is due to the specific nature of trust inherent in a financial asset and its

potential for conflicts of interest. It is further submitted that, in agreement again with the ISSA’s

position, such a role for an independent operator falls within the natural remit of existing market

infrastructure entities, which have already earned the trust of the market. For example,

custodian entities are long accustomed to operating as one of the most “heavily scrutinised

parts of the financial sector”79 and have developed a demonstrable record for trustworthiness.

In the words of Jonathan Watkins:

Custodian banking is yet to break into Hollywood as the subject matter of a feature

film. Investment banking, hedge funds, and derivative trading have all secured

star roles over the years, where there was even a steamy bathtub scene for

mortgage-backed securities in The Big Short. For custodians though – as the

infamously un-sexy side of banking – staying out of storylines like these is part of

the business. Safety, security, and discreetness [sic] is in the DNA of a custodian

bank whose job it is to protect assets. 80

The trust instilled by custodians in traders is reflected in the wider industry, particularly at sub-

custodian level. For many industry commentators, the continued reluctance of institutional investors to enter the crypto asset market stems from the continued reluctance of established custodian entities to hold these assets in custody.81 Crypto exchanges offering custody services for private keys may well be acceptable for hedge funds and other investors with a high risk profile which fall outside regulatory oversight. However, for regulated fund managers, who have to consider compliance as well as “justify moves” to their own investors,

78 European Securities and Markets Authority, ‘The Distributed Ledger Technology Applied to Securities Markets,’ (7 February 2017), 2 < https://www.esma.europa.eu/sites/default/files/library/dlt_report_-_esma50-1121423017-285.pdf > accessd 5 January 2018. 79 Watkins (n 42), 32. 80 Watkins (n 42), 30. 81 Watkins (n 42), 30.

127

it has been argued that “an established name such as Nomura or State Street would ease safety concerns with a bank guaranteeing asset administration and fund management services.”82 Thus, the issue has been reported to be that exchange-based custodians simply do not provide institutional investors with “the security and big-name assurance which traditional custodians provide for traditional assets.”83

It is submitted that such security and assurance is simply beyond the scope of cryptographic

proofs. Hence, DLT is unlikely to be ever be a substitute for the trust which underpins the

forward-looking nature of a promise by one person to do something in a future; this, from a

human perspective, will always require some degree of faith. It does not seem likely,

therefore, that the financial markets, its infrastructure, and the laws which govern it will ever

be wholly replaced by DLT, not unless investors are willing to take the full commercial risk of

every issuer and every counterparty with whom it may wish to trade, or manage every aspect

of asset ownership individually. Such individual responsibility on the part of investors has

been demonstrated as highly unlikely and, to this extent, is incompatible with a truly peer-to-

peer decentralised financial markets infrastructure.

82 Watkins (n 42), 31. 83 Watkins (n 42), 30.

128

4.4. Top-Tier Intermediaries

Higher up in the chain of intermediaries, one ‘big-name’ entity adapting to the crypto challenge

is the Australian Securities Exchange (‘ASX’). In June 2016, the ASX made global headlines

with the announcement it was exploring a DLT solution for its plans to replace its post-trade

platform for equities, the Clearing House Electronic Subregister System (‘CHESS’). Having

selected Digital Asset LLC, a fintech company, as its technical collaborator to test whether

DLT could plausibly underpin a post-trade platform, in December 2017 the decision to proceed

with a DLT solution was announced. This has been hailed as the “world's first industrial-scale

blockchain-based system for use in financial services.”1

CHESS has been in operation since 1994 and enabled a fully dematerialised system of share

ownership in the Australian equities market. CHESS performs two main functions: (i)

maintaining an electronic sub-register for shares in listed companies; and (ii) clearing and

settlement of trades in registered shares. CHESS is, therefore, not a CSD or depository

holding bearer securities on behalf of owners, but is a title register and settlement system.

The difference is significant, because this means CHESS participants are registered legal

titleholder to the securities recorded in their accounts. As such, the DLT-enabled advantage

of investors holding title directly, as demonstrated in the Nivaura and tØ platforms, is unlikely

to be much of an improvement upon the current position in CHESS. On the other hand, there

are many similarities between CHESS and a CSD: (i) most CHESS holdings are intermediated

by use of nominees and custodians; (ii) the settlement functions are common to both CHESS

and a CSD; and (iii) a CSD also operates as a root-of-title register. Furthermore, it has been

said that the distinction between bearer and registered securities now has, in reality, little

practical effect, given that the ‘overwhelming’ majority of issues are held indirectly through the

international clearing systems.2 The ASX DLT solution is, therefore, the most useful case

study for an analysis of applications of DLT at the second level of the financial markets

infrastructure to be examined in this paper: from the top-tier intermediary down.

4.4.1. The ASX’s CHESS

Share registration in CHESS is currently structured as two sub-registers: the CHESS sub-

register, which is maintained by ASX Settlement; and an Issuer Sponsored sub-register, which

1 A Barbaschow, ‘Here’s What to Expect from ASX’s Blockchain-Based CHESS Replacement’ (ZDNet, 25 October 2018) < https://www.zdnet.com/article/heres-what-to-expect-from-asxs-blockchain-based-chess-replacement/ > accessed 19 June 2019. 2 G Fuller, The Law and Practice of International Capital Markets (3rd ed, 2012, LexisNexis), [1.109].

129

is maintained by or on behalf of the company issuing the shares.3 The two sub-registers

cumulatively constitute the principal register4 which all listed companies are required to

maintain under s 169 of the Australian Corporations Act 2001. A certificated share sub-

register is also maintained for certain classes of securities ineligible for the Issuer Sponsored

and CHESS sub-registers.5

Registration on the CHESS sub-register requires sponsorship by an authorised CHESS

participant, usually a stockbroker, their settlement agent, custodian, or trustee, who is

authorised to operate shareholdings on the owner’s behalf pursuant to a sponsorship

agreement.6 Legal title remains with the shareholder throughout, who is identified in the

CHESS sub-register by means of a Holder Identification Number (‘HIN’) allocated by ASX

Settlement.7 In the absence of a sponsorship agreement with an authorised participant, share

ownership is registered on the Issuer Sponsored sub-register by default. Each holding is

identified by a unique Security-holder Reference Number (‘SRN’) which is allocated by the

relevant issuer.8

The clearing and settlement process is roughly as follows: trades executed on an Authorised

Market Operator (for equities, currently ASX Limited and Chi-X Australia) are first registered

with CHESS, then effected by novation with ASX Clear as CCP. On the evening of Trade

Date (‘T’), ASX Clear generally replaces all eligible novated settlements with one net

settlement per settlement date, per participant, and per security,9 which occurs on DvP Model

3.10 The obligations of the trading counterparties to deliver the securities and pay for them in

cash fall due on the second business day after the trade is agreed (i.e., on the T+2 basis).11

Title to the securities, as reflected in the share registries, are then simultaneously transferred

with the cash purchase price, via an interface with the Reserve Bank of Australia, the

Australian central bank.

3 ASX, ‘CHESS: Clearing House Electronic Subregister System’ (2011), 3 < https://www.asx.com.au/documents/research/chess_brochure.pdf > accessed 30 September 2018. 4 Securities Registrars Association Website, < http://sraa.asn.au/introduction-to-chess.html > accessed 4 April 2019. 5 Ibid. 6 ASX (n 3), 4. 7 ASX (n 3), 4. 8 ASX (n 3), 4. 9 ASX, ‘CHESS Replacement: New Scope and Implementation Plan’ (Consultation Paper, April 2018), [1.1.1] < https://www.asx.com.au/documents/public-consultations/chess-replacement-new-scope-and-implementation-plan.pdf > accessed 27 June 2018. 10 Reserve Bank of Australia, ‘Review of Settlement Practices for Australian Equities’ (May 2008) < https://www.rba.gov.au/payments-and-infrastructure/financial-market-infrastructure/clearing-and-settlement-facilities/consultations/review-practices/ > accessed 30 September 2018. 11 ASX (n 9), [1.1.2].

130

The title element of settlement occurs on the CHESS sub-register, irrespective of which sub-

register a share is registered. Where an investor has opted for registration on the CHESS sub-

register, their sponsor will execute trades on their behalf upon instructions and pursuant to the

terms set out in their sponsorship agreement.12 Where an investor has registered shares on

the Issuer Sponsored sub-register, a broker must be engaged to convert that holding to the

CHESS sub-register before the trade can be settled.13 Investors are then notified of changes

to their shareholdings by means of a holding statement in hard copy, which is mailed to their

registered address. Depending on which sub-register the holding has been registered, this

will be sent by either ASX Settlement, or by the relevant company.14

4.4.2. The ASX-Digital Asset DLT Solution

The scope of the DLT solution was defined at the end of 2017 after extensive public

consultations, engagement with issuers, meetings between the ASX’s Technical Committee

and Business Committee, six ASX-convened Working Groups, and regulatory engagement.15

Approximately 70-80 percent of the functions currently performed by CHESS were identified

as appropriate for migration into the DLT solution, with more specific changes to be delivered

through approximately 50 business requirements.16

For present purposes, the changes to account information are of particular interest: the

introduction of a Common Investor Number (‘CIN’) for both the CHESS and Issuer Sponsored

sub-registers, to be allocated and used in addition to HINs and SRNs.17 This is intended to

be used “to generate a consolidated portfolio view of holdings in which a client has an

economic interest based on a CIN specific to that client.”18 It is expected that such CIN will

be of particular value for investors not registered on the sub-register with a HIN or SRN, but

hold indirectly in the name of a settlement participant holding for multiple clients. Such

participants include nominee companies, trustee entities, and self-managed pension funds.

12 ASX (n 3), 5. 13 ASX (n 3), 5. 14 ASX (n 3), 5. 15 ASX (n 9), [1.3.1]; 5. 16 ASX (n 9), 5. 17 ASX (n 9), [2.2.1]. 18 ASX (n 9), [2.2.1].

131

Table 1. Scope of the Clearing and Settlement Software Build, identified as at 201719

Participant and

security definition The creation and maintenance of the legal entities required to facilitate the

activities of a clearing and settlement system.

Trade registration The ability to accept, register and confirm trades from market operators.

Pre-settlement

netting The netting of all market trades in each security per participant under model 3

DvP settlement.

Settlement Implementation of the settlement algorithm and DvP settlement of novated and

non-novated transactions.

Corporate actions The creation of any relevant cum entitlement balances, their management and

any consequential changes to investor holdings.

Although the CIN would increase the investors’ control over their own assets, there is some

indication that investors will continue to delegate such control to trusted intermediaries.

Although the Account Structures and Participant Models Working Group endorsed the

proposal of CINs on the basis that it will “increase timely transparency of ownership and control

of securities,”20 it also specifically requested that the new system have flexibility to “support

and enhance the current omnibus/custody model.”21 It is worth noting also that the CIN is

intended as an enhancement for investors in generating a consolidated portfolio view of

holdings across sub-registers and holding structures; it will not necessarily enhance access

to the value of the financial asset in the performance of the issuers’ obligations through direct

remittance of payments.

This is to be contrasted with the intention to enable ‘additional investor information’ (‘AII’) to

be entered on settlement accounts to “streamline” the processing of corporate action for

nominee holdings.22 Settlement accounts currently record only the registered holder’s

details,23 so it is expected that AII could be useful for issuers wishing to extend corporate

actions to shareholders who are not registered on CHESS directly, but indirectly through a

nominee company holding as custodian. For example, when the issuer decides to extend a

share purchase plan (‘SPP’), the nominee could make the AII available to the issuer’s registry

19 ASX (n 9), [1.2.1]. 20 ASX (n 9), [2.2.1]. 21 ASX (n 9), [2.2.1]. 22 ASX (n 9), [2.2.2]. 23 ASX (n 9), [2.2.2] fn 5 and text at 18.

132

so that the size of the SPP allocated to it can be determined by reference to the number of

shares the nominee actually holds on behalf of its beneficiaries.24 It is expected that the AII

will, thus, result in greater efficiency. The Account Structures and Participant Models Working

Group endorsed the proposal for AII on the same basis as it did for CINs, as well for its

potential to enhance SPPs.25

As with CINs, AII would not necessarily provide beneficial owners holding through an

intermediary with the certainty of ownership associated with legal title. Given that the ASX

anticipates that the implementation of AII will require further consideration of the consequent

privacy implications, it does not appear that AII will be entered directly on the sub-registers

themselves. The recording and storage of AII, however, as opposed to provision ad hoc, may

require reconsideration of what is formally recognised as ‘the official title register’ and how the

interest represented by registration should be characterised. This seems particularly relevant,

given that the ASX anticipates potential changes to certain regulatory requirements and

broader legislative amendments to facilitate AII.26

Under the current ASX Settlement Operating Rule 8.10.3, the ASX need not recognise any

interest or right in respect of a financial product other than the absolute right of legal ownership

by the registered holder. Furthermore, the Australian Corporations Act 2001 expressly

prohibits any notice of trust, whether express, implied or constructive, being entered on a

register, other than in limited circumstances, such as trustees on death, incapacity or

bankruptcy of shareholder or with company’s consent.27 Such provisions are common in title

registries in jurisdictions where trusts are recognised; the UK Companies Act 2006 provides

that “no notice of any trust, expressed, implied or constructive, shall be entered on the register

of members of a company registered in England and Wales or Northern Ireland, or be

receivable by the registrar.”28

Though not explicitly stated, it appears that such provisions derive from the ‘curtain principle’

first enunciated in the Australian ‘Torrens’ system of land registration, which has now spread

across much of the common law world. Under the principle, trusts are kept off the title register,

enabling third parties to transact with registered owners “safe in the assurance that trust

24 ASX (n 9), [2.2.2]. 25 ASX (n 9), [2.2.2]. 26 ASX (n 9), [2.2.2]. 27 Corporations Act 2001 s 1072E(10). 28 Companies Act 2006 s 126.

133

interests will be overreached and shifted onto the capital proceeds of the disposition.”29 A

more significant reason, however, may be that as a matter of the law of trusts, beneficial

interests are simply irrelevant at law; a beneficiary has no entitlement to deal with trust

property nor standing to sue in respect of it. Such rights vest in the trustee alone; for all the

rest of the world is concerned, the trust and beneficiary do not exist.

It is conceivable, nevertheless, that a permanent record of AII stored on-chain, perhaps as an

Oracle, and made available to an issuer’s registry could eventually be recognised as the

definitive record of title. In substance, it would be difficult to argue why not; a permanent and

reliable source of information identifying the economic owners, even if originally intended

merely for the purpose of streamlining the issuer’s performance of the underlying obligations,

arguably obviates any need for any separate record of legal title. However, the issue is, again,

that beneficiaries receiving trust property directly and being identified on a register of legal title

is inconsistent with the law of trusts. Recognition of the record of AII as the definitive register

of title will, therefore, necessitate a change from a characterisation of economic investors as

trust beneficiaries to one where they own as bailors.

Whether or not investors will wish to be registered legal titleholders, however, is another

question. It is worth noting some of the underlying psychological factors and assumptions

made in respect of intermediated securities ownership. It was demonstrated that in the context

of crypto assets, the price for decentralised access to information without a hierarchy of trust

is heightened responsibility on the individual to safeguard their private keys. Recent research

by the UK’s National Cyber Security Centre, however, suggests that even simple password

management for online accounts presents a significant security risk: ‘123456’ was the most

commonly used password in a survey of public databases for breached accounts.30 When

users demonstrate such lax attitude to security, it may well be unfair to impose liability on an

account provider for any breach or hack. Against this backdrop, Overstock’s decision not to

allow investors to manage private keys directly, on the basis they are unaccustomed to the

level of security such management requires, may well be considered prudent. Similarly, Mr

Cohen does not expect investor appetite for managing private keys directly within the Nivaura

context.31

29 Gray and Gray, Elements of Land Law (5th ed, OUP 2009), [2.2.20], citing the UK Land Registration Act 2002 s 78 and Wolfson v Registrar General (NSW) (1934) 51 CLR 300, 308 per Rich and Evatt JJ. 30 BBC News, ‘Millions Using 123456 as Password, Security Study Finds’ (BBC News, 21 April 2019) < https://www.bbc.com/news/technology-47974583 > accessed 21 April 2019. 31 Telephone conversation between R Cohen and author, 31 May 2019.

134

Another less extreme but more pervasive facet of eschewing individual responsibility is

reflected in the origins of global custody itself. Traditionally associated with institutional

investors, the service enabled institutional investors lacking the time (or inclination) to manage

every aspect of owning an international portfolio in every jurisdiction where they had holdings

to delegate key tasks to others. Hence, one key question that advocates of direct investor

holdings of financial assets appear to overlook is: do investors actually want the responsibility

of individual ownership? Current practices suggest they do not; proxy voting at the mandatory

company AGM, or reliance on the debenture trustee to monitor issuer defaults and instigate

enforcement actions, are just two ways in which economic owners of a financial asset enjoy

the benefits of ownership without the corresponding responsibilities. Although the decided

cases and commentary may suggest that investors desperately seek liberation from the

oppression of indirect holdings, the practical reality is that litigation – at least over financial

assets – usually only occurs during crises, most often insolvency, and the investor’s faith in

the promise of the debtor proves unjustified. For the vast majority of the time, however,

investors generally seem content to pay the price of forgoing legal title for the convenience of

delegating to others the responsibilities of securities ownership. This attitude is reflected in

the ASX’s DLT solution in two distinct ways: (i) in the repeated requests by the Account

Structures and Participant Models Working Group that the new system have flexibility to

“support and enhance the current omnibus/custody model;”32 and (ii) the technical

specifications of the DLT solution itself.

The new solution will be implemented through a permissioned distributed ledger in which:

(i) authorised users may participate directly in the network by operating a node;33

(ii) authorised users, alternatively, may continue to access the clearing and

settlement functions through a message-based protocol using a data API;34

(iii) ASX alone will operate a ‘mining’ node, known as a ‘Committer’ node, and

thereby have authority to commit transactions to the ledger;35

(iv) Relevant third parties, such as Approved Market Operators and the Reserve

Bank of Australia, will have access via messaging protocols and existing

interfaces.36

32 ASX (n 9), [2.2.1]; [2.4.1]. 33 ASX (n 9), [5.1]. 34 ASX (n 9), [5.1]. 35 ASX (n 9), [5.1]. 36 ASX (n 9), [5.3].

135

The new platform combines DLT and a post-trade application written in Digital Asset’s

proprietary smart contracting language, Digital Asset Modelling Language (‘DAML’). The post-

trade DAML application is used to process the business logic, which is then recorded on the

DA distributed ledger. For privacy and scalability purposes, the DA distributed ledger, like

Quorum, consists of two components: the Private Contract Store (‘PCS’) and the Global

Synchronisation Log (‘GSL’).

Figure 1. CHESS Replacement Context Diagram37

The PCS is unique to any given user participant node, and allows direct, real-time access to

structured data relevant to that user, such as positions taken by themselves and any counter-

parties in off-chain commercial transactions, and all validated contracts to which that user is

a party.38 Users can then develop interfaces between the node with their own existing systems

to create a single source of truth within their own data infrastructure, eliminating the need for

external reconciliation.39

The GSL is the shared, replicated, append-only record of immutable evidence of events,40 that

is, the ‘blockchain’ in the bare sense described in Chapter 2 as a record of changes in state

across a blockchain network. Only the ASX will be authorised to mine and commit blocks to

37 ASX (n 9), [5.1]. 38 ASX (n 9), [6.6.1]. 39 ASX (n 9), [6.6.1]. 40 ASX (n 9), [6.1].

136

the GSL, using the Committer node41 and, although this may give rise to problems of trust,

users can rely on the Committer node as secure in respect of the content of the smart contracts

because these are stored in the relevant users’ PCSs.42 The combination of the PCS and

GSL, thus, gives each node a distinct view of the distributed ledger.43

What is striking from the perspective of investor empowerment through direct ownership

rights, and vindicating the ‘eschew responsibility' theory, is that there is no requirement that

users must, nor even a presumption that users will wish, to operate a node. Speaking at

Sibos, Sydney 2018, Cliff Richards, the general manager of Equity Post-Trade Services at

ASX, confirmed that the CHESS replacement was not “forcing a change on the market” and

that authorised users will have a choice regarding whether or not to access the system directly

with a node. To support users who do wish to operate a node, the ASX will provide an on-

boarding process governed and managed by the ASX, which will offer user-nodes as a

managed service. Recognising, however, that requiring each user to operate a node as a

condition to the DLT solution would leave the ASX “waiting for 10 years…[having] to convince

the very last doubter [and] sceptical participant that they should take a node and join the

network,” participants who are not ready or unwilling to move are not required to do so.44 Such

users will continue to be able to use a standard message-based connection to the new system.

This split between node-based users and traditional messaging users adds another

perspective to the legal question of the relative weight to be given to the private key and the

blockchain. That the ASX solution does not require participants to adopt a node nor to transact

by means of a message signed cryptographically by a private key shifts the balance on the

side of the blockchain. However, the Digital Asset Non-Technical Whitepaper states that such

message-based users, defined as ‘indirect participants’ in the Whitepaper, are required to

delegate the implementation of their trading activities to a direct participant, that is, a user

operating a node directly, or to the operator of the system itself.

In any event, emphasis on the blockchain over the private key is to be expected in this context

as, unlike CSDs, title registries, even those which perform settlement functions, were and still

remain first and foremost definitive records of ownership. Traditionally, title registers do not

provide any clearing and settlement functions as such; this substantively occurs ‘off register’

41 ASX (n 9), [6.5]. 42 ASX (n 9), [6.1]. 43 ASX (n 9), [6.5]. 44 Barbaschow (n 1).

137

Figure 3. Interaction between Participant Node and ASX45

in the execution of the written transfer instrument between transferor and transferee. Hence,

questions of ‘settlement finality’ do not arise to the same extent nor in the same manner as

they do in the context of a CSD; once the transfer instrument has been effected, entry on the

definitive register is determinative of legal title. In the case of HM Land Registry, entry on the

register sometimes overrides the fact that legal title would not have otherwise vested in the

registrant:46 in such cases, registration is conclusive if there has otherwise been compliance

45 ASX (n 9), [6.8]. 46 Land Registration Act 2002 s 58(1) holds that registration is conclusive; if a person is entered in the register as the proprietor of a legal estate, but the legal estate would not otherwise be vested in that person, the result of registration is that title is deemed to vest.

138

with all registration requirements.47 Two main legal property questions then arise where the

blockchain trumps the private key as a definitive register of ownership maintained by an

intermediary.

First, the legal status of erroneous entries or entries on the blockchain procured by fraud. Part

4.4.1 considered rectification or effective rectification of the blockchain after fraudulent or

unauthorised use of a private key in an unpermissioned network and concluded that a right to

rectification was not feasible. It did, however, defer discussion of rectification in the context of

a permissioned network, especially those in which only the operator is permitted to mine

blocks. In such cases, of which the ASX DLT solution is the paradigm, there is no reason why

rectification or effective rectification would not be possible. Two methods to this end are

available.

The first reflects the current practice of the ASX and relies on the settlement aspects of

CHESS. Under the current ASX Settlement Operating Rules, where both the ‘source holding’

and ‘target holding’ of an erroneous or unauthorised transfer of assets are controlled by

CHESS participants, the participant controlling the target holding is required to “take any such

action necessary to transfer the financial products back” within two business days of receiving

advice or otherwise becoming aware of the transaction.48 The participant responsible for the

erroneous transaction is liable to indemnify ASX Settlement, the issuer, the holder/transferee,

and the participant controlling the holding for all losses, damages, costs and expense those

parties may suffer or incur by reason of the transfer.49

Alternatively, a second method draws upon the traditional power conferred on the registrar to

rectify the register, either of its own accord or by court order. For example, under the UK Land

Registration Act 2002, the registrar may make alterations for the purpose of correcting a

mistake, bringing the register up to date, or giving effect to any estate, right, or interest

excepted from the effect of registration.50 The power, however, is qualified; the proprietor’s

consent is required unless he has by fraud or lack of proper care caused or substantially

contributed to the mistake, or it would for any other reason be unjust for the alteration not to

be made.51

47 Land Registration Act 2002 s 58(2) qualifies s 58(1), which does not apply if there are other registration requirements which remain to be unmet. 48 ASX Settlement Operating Rules (1 August 2010), Rule 9.11.1 < https://www.asx.com.au/documents/rules/ASX_Settlement_Rules_Section_09.pdf > accessed 22 April 2019. 49 ASX Settlement Operating Rules (n 48), Rule 9.11.2. 50 Land Registration Act 2002 Schedule Four, ss 4 and 5. 51 Land Registration Act 2002 Schedule Four, ss 3 and 6.

139

In principle, there does not seem to be any reason why, in permissioned blockchain networks,

a power to rectify the blockchain by reversing the effect of transactions could not be conferred

upon miners, rather than requiring that users execute a new transaction. This is all the more

so in the ASX DLT solution, in which only the ASX will have the authority to commit blocks to

the GSL; no problems of consensus or authority to reverse a transaction, therefore, arise. It

is worth noting that, according to the Digital Asset Non-Technical Whitepaper, although direct

network participants cannot prevent fraud or error on the part of the Operator (that is, the role

played by ASX as the Committer Node), participants can also independently detect it in

authorising and authenticating their own transactions and validating their PCS.52 It is

submitted that the risks, however, of fraud on the part of the Operator are considerably less in

cases such as this, which makes use of an independent intermediary which already occupies

a comparable position of trust in the financial markets, and has done so for quite some time.

The second legal property question which arises where the blockchain is definitive is closely

related to erroneous entries or entries procured by fraud: the legal significance of the private

key itself. Professor Anderson et al suggested that the signing of a transaction with a private

key could be a rebuttable presumption of ownership, however, this approach is of limited

application in the context of a definitive title registry where there is no scope for any such

presumption. Rather, in this context it appears that the private key functions exactly as it is

was designed: as an identification credential to prove that any instruction to the registry to

transfer title is valid. Again, a strong correlation between private keys with the concept of

possession and control, at least in respect of the property incident of alienability, is

demonstrated.

4.4.3. Summary

This Part examined the use of DLT at the second level to be explored in this paper, at that of

the top-tier intermediary, having established in the previous Part that infrastructure

intermediaries are unlikely to be ever wholly replaced by DLT in the financial markets. Hence,

the ASX DLT solution demonstrated that where such intermediaries adopt DLT, they do not

necessarily pursue enhanced investor rights of ownership; notwithstanding the obvious

potential of DLT to enable direct securities ownership. Rather, such applications of DLT are

52 Digital Asset, ‘The Digital Asset Platform: Non-Technical White Paper’ (December 2016), [3.1.2] at 19 < https://hub.digitalasset.com/hubfs/Documents/Digital%20Asset%20Platform%20-%20Non-technical%20White%20Paper.pdf > accessed 30 September 2018.

140

far more likely to have efficiency as the overriding objective. A parallel may, thus, be drawn

with the G30’s endorsement of immobilisation and dematerialisation in the 1980s as a solution

to the inefficiencies of paper bearer instruments.

The ASX solution takes this proposition one step further, expressly aiming to implement a DLT

solution with minimal disruption to the status quo and without forcing a change on the market.

This is most evident in the option for users unwilling to participate directly in the Digital Asset

network as a node to retain a message-based method of accessing the system. Bypassing

the use of a private key altogether marks a serious challenge to the position that private keys

assume such significance that they may be considered equivalent to the crypto asset itself.

It is perhaps unsurprising that such option for investors to dispense with the private key occurs

in an application where the blockchain is intended as a register of title and the crypto asset is,

therefore, a registered security. Here, however, proposed methods of streamlining certain

functions have revealed unexpected ways in which the ASX DLT solution, for all its intention

not to force changes on the market, may well effect prompt reconsideration of norms

surrounding title by register. The proposal to store a complete record of the identities of the

economic investors within the DLT solution challenges the long-established principle that

beneficial interests are kept off-register and the very concept of holding investment securities

on trust at all. On some level, there seems to be no good reason why such record of ultimate

investors should not operate as the definitive title register. However, this would be

incompatible with the law of trusts; it is submitted that characterisation of the investor as bailor,

rather than trust beneficiary, would be an effective solution.

Fortunately, this is consonant with the proposed characterisation of crypto assets as an

abstract entitlement to participate in an unincorporated blockchain association which is bailed

to an intermediary, who holds possession represented by the private key. In this case study,

the association is formally governed by contract; complete with formal membership criteria,

operating rules, and standards of conduct. The concept of bailing such entitlement to a bailee

– with the investor remaining registered title-holder in the AII record – who holds the interest

of possession represented by the private key, is also consistent with the fact that some

investors may choose to retain the message-based system of interacting with the DLT

solution. It is also worth noting that the ASX model does not support any other characterisation

of the private key considered. The rebuttable presumption of ownership cannot apply where

entry on the register is definitive of title. As therefore, a mandate-based model of bailment,

an indirect participant of the DA network may be distinguished from the LuxDeco-Nivaura

bondholder, who has direct ‘self service’ to private keys held by the Custodian. Direct

141

participants in the DA network obviously hold the entitlement directly and do not bail at all,

although it is worth noting that node administration, like portfolio administration, is offered by

the ASX as a manged service. Intermediaries are, thus, likely to be retained in any event.

By way of conclusion, it is worth noting that Digital Asset’s position stands at the polar opposite

of the utopian advocates of lex cryptographia:

Some proponents of smart contracts have argued for the position that “the code

is the agreement.” This is to say that smart contract code is immutable and that

any outcome of the code itself is necessarily what the parties intended. It follows

that there should be no recourse to dispute resolution through existing legal

systems, centuries of common law legal precedent, nor reference to standard legal

prose contract terms (even when an outcome results from a clear bug in the smart

contract code).

Given the requirements of financial markets noted above, Digital Asset takes the

view that code used for automation must remain subservient to legal systems and

dispute resolution, market rules and commonly understood legal prose.

Consequently, we designed DAML explicitly to enable the implementation of this

hierarchy — delivering the benefit of automated workflows, while ensuring parties

continue to have the certainty afforded to them today by the common legal

foundation they all share.53

53 Digital Asset (n 52), [2.2.1] at 13. Emphasis added.

142

4.5. Intermediaries Inter Se To some extent, adoption of DLT lower down in the chain of intermediaries has been already

considered at various points throughout Chapter 4. Exchanges providing custody services

were considered in respect of crypto assets generally, whereas use of a blockchain as a

register for Asset Tokens within the current intermediated financial markets infrastructure was

seen in the context of the LuxDeco-Nivaura Control bond. As the market in crypto assets

continues to grow, particularly with the initiatives to develop a complete eco-system

comparable to the current infrastructure specifically for crypto assets,1 paradigms for lower-

tier intermediaries are likely to emerge.

A slightly different use of DLT at this level is between intermediaries inter se. As suggested

by Philip Paech:

Consortia of market players might come to build ‘crypto-enclaves’ within the current

financial markets infrastructure, setting up a DLT settlement mechanism amongst them

in which ‘their own’ crypto-securities are traded and settled. However, these crypto-

securities would be tokenised versions of existing intermediated securities, issued and

held in the existing financial markets infrastructure.2

As such, what Dr Paech defined as ‘intermediated crypto-securities’ best correspond to ISSA’s

‘Asset-Backed Token,’3 with the underlying asset an intermediated security. This classification

is preferable to FINMA’s,4 whose ‘Asset Tokens’ do not distinguish between the issuer-led

process of tokenising an intermediated security at issue (what Dr Paech calls ‘native’ crypto-

assets);5 CSD-led tokenising, which naturally occurs after issue (roughly equivalent to ’trans-

crypto assets,’ albeit with some minor differences); 6 and post-issue tokenisation by groups of

market participants, which is what is discussed here.

1 Such as the Gibraltar Blockchain Exchange < https://gbx.gi > accessed 1 February 2019; and the Swiss SIX Digital Exchange < https://www.six-group.com/en/site/digital-exchange.html > accessed 9 September 2018. 2 P Paech, ’Integrating Global Blockchain Securities Settlement with Law and Regulation - Policy Consideration and International Principles‘ (2016), [2.3] at 5 < papers.ssrn.com/sol3/papers.cfm?abstract_id=2792639> accessed 18 December 2017. 3 Table 1 at 51 above. 4 Table 2 at 51 above. 5 Paech (n 2), [2.1] at 4. 6 Paech (n 2), [2.2] at 4.

143

In this context, Corda and Quorum are both popular choices for financial institutions wishing

to experiment with DLT solutions. Here, the vast majority of use cases so far tend to be

grounded in traditional banking, such as syndicated loans,7 inter-bank reconciliation,8 and

trade finance.9 In the capital markets, one particular use case that has received significant

attention is collateral management.

4.5.1. HQLAX - Deutsche Börse

In late 2017, Global Custodian reported a widespread concern regarding the supply of

collateral eligible for posting by traders for margining purposes. This was attributed to the

accumulation of high-quality liquid assets (‘HQLA’) in banks and CCPs as a consequence of

the Basel III capital adequacy rules. The problem was, therefore, not one of collateral

shortage, but ‘collateral velocity’, particularly during periods of market stress where margin

can be called on a daily or even intra-daily margin basis.10

HQLAX is a fintech firm which has been developing a DLT solution to this problem since

February 2017,11 when it launched a prototype of its platform in collaboration with five banks

and r3.12 In March 2018, collaboration with the Deutsche Börse Group13 was announced for

“improv[ing] collateral mobility across a fragmented securities settlement eco-system”14 using

DLT. Their target operating model is built on Corda and utilises an Asset-Backed Token, called

7 Finestra-r3, ‘Case Study: How Finastra is harnessing R3’s Corda Enterprise blockchain to open up a new business line and transform transparency and efficiency in the syndicated loan market’ < https://www.r3.com/wp-content/uploads/2019/04/Finastra_CS_R32018pdf.pdf > accessed 19 May 2019. 8 ABILab et al-r3, Case Study: Italian banks pioneer the use of Corda Enterprise for interbank reconciliation—opening the way to a full production roll-out <https://www.r3.com/wp-content/uploads/2019/04/Spunt_CS_R32018.pdf > accessed 19 May 2019. 9 CryptoBLK-r3, Case Study How R3 is working with CryptoBLK, HSBC and other banks and corporates to revolutionize and revitalize trade finance letters of credit, using the power of the Corda blockchain platform’< https://www.r3.com/wp-content/uploads/2019/04/CryptoBLK_CS_Jan2019.pdf > accessed 19 May 2019. 10 J Watkins, ‘Collateral Fears Driving Direct CCP Model’ (Global Custodian, Winter 2017), 16. 11 HQLAX Website, ‘Why Us?’ < https://www.hqla-x.com/overview/#1504943598221-adfa7134-5c49 > accessed 16 June 2019. 12 HQLAX Website, ‘From Concept to Reality’< https://www.hqla-x.com/overview/#1559719016778-6697e189-c5e9 > accessed 15 June 2019. 13 Deutsche Börse, ‘Deutsche Börse and HQLA make significant progress on blockchain securities lending solution,’ (Press Release, 29 January 2019) < https://www.deutsche-boerse.com/dbg-en/media/press-releases/Deutsche-B-rse-and-HQLAX-make-significant-progress-on-blockchain-securities-lending-solution--1413678 > accessed 19 December 2018. The exchange conglomerate acquired a minority stake in HQLAX in August 2018 and a second tranche of shares in December 2018. 14 HQLAX Website < https://www.hqla-x.com/ > accessed 14 June 2019.

144

a Digital Collateral Record (‘DCR’), to represent pre-defined baskets of eligible HQLA and

non-HQLA collateral held with a custodian in traditional intermediated form. These underlying

assets remain off chain and ‘static’ in a single segregated account of the collateral giver at a

trusted third-party custodian; thus, transfers of DCRs within the HQLAX platform do not involve

any transfer of the underlying securities.15 The DCRs, however, can be used to exchange

“legal title”16 over these baskets in transactions such as collateral upgrade/downgrades or

pledging collateral to meet initial or variation margin requirements of derivative products.17

The platform itself is structured in four layers (Figure 1): (i) access is granted through Deutsche

Börse’s Eurex Repo electronic trading system; (ii) market participants create and trade DCRs,

which are managed by HQLAX and recorded on the Corda blockchain; (iii) the DLT platform

interfaces with the existing market infrastructure via Deutsche Börse as the Trusted Third

Party (‘TTP’); (iv) tri-party agents and other custodian entities hold the underlying baskets of

collateral in the international settlement system on behalf of Deutsche Börse as TTP, which in

turn holds on behalf of the users of the HQLAX platform.

It is expected that keeping the underlying securities ‘static’ in the segregated securities

account of a tri-party agent will facilitate improved collateral ‘fluidity’ across various systems

and jurisdictions. 18 The underlying concept is, thus, identical to that which underpinned

immobilisation of bearer securities;19 the same benefits of efficiency are sought by keeping

the underlying asset immobilised, whilst the abstract entitlement to the asset is freely traded

by means of a new and novel method. Whereas immobilisation dispensed with legal transfer

by way of physical delivery of bearer paper instruments, HQLAX’s blockchain solution offers

to dispense with legal transfer by way of book entries within a T+1, T+2, or T+3 framework in

the international settlement systems.

15 HQLAX Website < https://www.hqla-x.com/overview/ > accessed 14 June 2019. 16 This was stated on the former website of HQLAX which has since been updated < https://www.hqla-x.com/operating-modell/ > last accessed 17 April 2019. Although the new website does not refer to DCRs as transferring legal title, references remain on HQLAX’s page on the r3 website, which states “DCRs (Digital Collateral Records) will represent baskets of securities held for safekeeping at a trusted third party. The free exchange of DCRs will affect legal title transfer of the underlying securities that comprise the DCRs, thereby facilitating liquidity transfers without the operationally onerous requirement to move securities” < https://marketplace.r3.com/solutions/hqlax > accessed 12 June 2019. Reference to legal title is also made in the HQLAX promotional video at 1:31 < https://www.hqla-x.com/ > accessed 12 June 2019. 17 HQLAX Website, ‘Use Cases’ < https://www.hqla-x.com/overview/ > accessed 18 June 2019. 18 Deutsche Börse (n 13). 19 Part 2.2.2 at 12 et seq above.

145

Figure 1. HQLAx & Deutsche Börse Group - Target Operating Model20

The key practical difference with immobilisation, however, lies in the limited application and use of DCRs across the market as a whole: transfers of legal title to securities represented by

a DCR are recognised only within what Dr Paech called the ‘crypto-enclave’ within the wider

market. By contrast, the G30’s endorsement of immobilisation and dematerialisation of

securities in 1980s was premised on national CSDs established for all issues in a jurisdiction.21

Although, therefore, HQLAX has described the current system of intermediated holdings as

‘legacy’ 22 infrastructure, the fact remains that the platform will remain premised on the

intermediated structure of ownership.

Dr Paech draws a parallel between such crypto-enclaves and the existing intermediated

system, noting that crypto-enclaves give rise to similar risks of conflict and mismatch “because

different legal positions ultimately link to the same underlying asset, and the avoidance of

conflicts entirely depends on the compliance of the intermediary.”23 The HQLAX model,

20 HQLAx & Deutsche Börse Group, ‘Target Operating Model’ < https://www.deutsche-boerse.com/resource/blob/1413686/d0619e3c15e557a8f566845c516db169/data/29jan2019-hqlax_en.pdf > accessed 1 May 2019. 21 Group of Thirty, ‘Clearance and Settlement in the World’s Securities Markets’ (1989), Recommendation 3 at 7; 51-55. 22 HQLAX Former Website, < https://www.hqla-x.com/operating-modell/ > last accessed 17 April 2019. 23 Paech (n 2), [2.3] at 4-5.

146

however, either by coincidence or design, insulates against this risk though a number of its

features. First, the use of tri-party agents at a relatively ‘high’ level of the chain of

intermediaries, that is, those which are an ICSD or a direct subsidiary24 (Table 1). Second,

these tri-party agents hold the securities in segregated accounts. Third, from the inverse

perspective, there is common point of entry and trading through Deutsche Börse’s Eurex Repo

platform. Taking these factors together, there seems to be minimal risk of mismatch between

securities represented by the DCR and those in general circulation in the markets. As a result,

the crypto-enclave in this particular case study may well be said to operate parallel to the

intermediated system, rather than within it. Where, however, enclaves are truly integrated at

a lower level of the chain of intermediaries, the risks will be considerably greater; the legal

analysis will be much more premised upon and limited by particular legal characterisation of

the intermediated system in question.

Table 1. Tri-Party Agents eligible in the Eurosystem credit operations.

Domestic Use25 Cross-Border Use (Correspondent Central Banking Model)26

Belgium: Euroclear Bank Belgium: Euroclear Bank (Model 3)

Germany: Clearstream Banking AG Germany: Clearstream Banking AG (Model 1)

France: Euroclear France France: Euroclear France (Model 3)

Luxembourg: Clearstream Banking SA Luxembourg: Clearstream Banking SA (Model 2)

Italy: Monte Titoli

This raises a different, but even more significant issue. As noted above, HQLAX states that

DCRs can be used to exchange “legal title ownership” in respect of the underlying basket of

securities. Obviously, this cannot be taken as a definitive statement of law or contractual

representation as to the legal property rights in a DCR, but merely as evidence of the parties’

intention that title is so conferred. However, it nevertheless draws attention to the fundamental

property question of what the owner of a DCR actually will own.

24 Clearsteam Banking SA and Euroclear Bank are the two ICSDs. See further Clearstream Banking SA, ‘Customer Handbook’, (Document No 0021, Version 27 May 2019) and Euroclear Bank Website < https://www.euroclear.com/services/en/banking-services-all-providers.html > last accessed 28 June 2019 for further information on the corporate structures. 25 European Central Bank: Eurosystem Website, ‘List of TPAs eligible for domestic use’ < https://www.ecb.europa.eu/paym/coll/coll/triparty/html/index.en.html > accessed 1 June 2019. 26 European Central Bank: Eurosystem Website, ‘List of TPAs eligible for cross-border use via the CCBM’ < https://www.ecb.europa.eu/paym/coll/coll/triparty/html/index.en.html > accessed 1 June 2019.

147

The legal nature of ownership in respect of an intermediated security varies considerably

between jurisdictions, but the most relevant distinction to be drawn for present purposes is

between direct and indirect methods of holdings. In all common law jurisdictions, and some

civil law jurisdictions, notably Belgium and Luxembourg where the two ICSDs are

headquartered, investors hold indirectly: in English law, intermediated securities are formally

beneficial interests under a sub-trust;27 in Belgium28 and Luxembourg,29 primary legislation

converts what would be a contractual claim against the intermediary into a co-proprietary right

in the intermediary’s pool of fungible securities. It follows that investors holding such rights

have no legal entitlement to enforce the financial asset directly against the issuer; nor the right

to bring a claim against higher tier intermediaries. Instead, investors must rely on the

contractual and fiduciary obligations of the intermediary with which it maintains an account to

pursue such claims.

In direct holdings, the investor itself enjoys both the right to transfer its entitlement as well as

the right to exercise the terms of the securities; the investor can sue an issuer in default and

obtain a judgment directly enforceable against it. 30 In the domestic German securities

settlement system and holding structure, securities are normally issued as global certificates

which are deposited with the CSD.31 Unlike the common law position, however, title is held

by the ultimate investor. This is effected through a legal mechanism called ‘indirect

possession’ (mittelbarer Eigenbesitzer) whereby the CSD is the direct bailee (unmittelbarer

Fremdbesitzer)32 and the intermediaries indirect bailees (mittelbarer Fremdbesitzer) of the

investor.33 These entities normally exercise rights over the securities on the investor’s behalf

as its authorised attorney and do not have any legal interest in the securities in their own

right.34

27 Re Lehman Brothers International (Europe), also known as Lomas v RAB Market Cycles (Master) Fund Ltd [2009] EWHC 2545 (Ch); Re Lehman Brothers International (Europe), also known as Pearson v Lehman Brothers Finance SA (RASCALS) [2010] EWHC 2914 (Ch). 28 Articles 2, 12, and 13, Belgium Royal Decree No 62 of 10 November 1967; Euroclear, ‘Rights of Participants to Securities deposited in the Euroclear System (July 2017), [2.2.3] < https://ecsda.eu/wp-content/uploads/BE_Euroclear_Bank.pdf > accessed 4 May 2019. 29 Article 3, Law of 1 August 2001 on the circulation of securities, as amended (Mém. A 2001, No 106). 30 Law Commission of England and Wales, ‘The UNIDOIT Convention on Substantive Rules Regarding Intermediated Securities: Further Updated Advice to HM Treasury’ (May 2008), [2.38]. 31Law Commission of England and Wales (n 30), [2.36]. 32 § 868 Bürgerliches Gesetzbuch. 33 § 871 Bürgerliches Gesetzbuch. 34 § 185 Bürgerliches Gesetzbuch.

148

Hence, what owners of a DCR actually own will be premised on the question of ‘at what end’

of the intermediary chain legal title is located. Systems in which legal title of the intermediated

security is held by the investor, such as the German domestic CSD, are relatively simple; no

conflicts of title arise because the DCR created by the investor represents the security to which

the investor already holds legal title. By contrast, where investors hold indirectly, there is

considerable scope for conflict between legal title to the DCR, purportedly vested in the

investor, and legal title to the HQLA that the DCR represents, which is vested in the common

depository holding for the ICSD, or depository for the domestic CSD. In the HQLAX model, at

least where Euroclear Bank and Clearstream Banking SA are used as tri-party agents,

investors cannot hold title to a DCR where the DCR is intended to represent the underlying

security. Owing to the fact that both ICSDs make use of an indirect system of holding,

Deutsche Börse as the TTP will only hold an co-proprietary interest in the underlying baskets

of HQLA; it follows that users of the HQLAX cannot hold title to the DCR if it is intended that

DCRs represent the HQLA itself.

One solution to this problem is to consider the DCR as representing, not the underlying

security, but the investor’s beneficial entitlement against its immediate custodian in respect of

the underlying HQLA. This would essentially involve a process of reification; turning the

equitable obligation owed by the intermediary into a tradeable asset in its own right and

represented by a DCR. Such process of reification is the very essence of financial property;

it is none other than that through which a contractual obligation to repay a debt became a

tradeable asset in its own right, taking form as a negotiable bearer bond. A notable difference

in this context is, however, that the DCR asset is the result of at least two reifications of two

different obligations: the DCR represents (i) the equitable obligation owed to the investor by

the custodian, through a chain of sub-trusts to the common depository; who is owed (ii) a

contractual obligation to be paid by the issuer under the terms of the bond. Such degrees of

abstraction in proprietary rights and interests are unprecedented in English personal property

law, yet the principle is not dissimilar to the doctrine of estates in the context of land:

At the heart of medieval theory lay the proposition that there could be no ownership of

land, as such, outside the allodium – or prerogatival title – of the crown. The object of

each tenant’s ownership was instead an artificial proprietary construct called an ‘estate’.

The notional entity of the estate was interposed between the tenant and the land, with

the consequence that each tenant owned (and still owns) not the land itself but an estate

149

in land, each estate being graded with reference to its temporal duration. Consonantly

with the feudal theory of ultimate sovereign title, some form of abstract estate constitutes

the maximum interest which any subject – we should nowadays say citizen – may ever

hold in respect of land. All proprietary relationships with land thus fall to be analysed at

one remove – through the intermediacy of an estate – the tenant always having

ownership of an intangible right (i.e., an estate) rather than ownership of a tangible thing

(i.e., the land). At this point the law of real property becomes distanced from the physical

reality of land and enters a world of considerable conceptual abstraction.35

Although, therefore, the increasingly reified and abstract nature of financial property may

well seem without precedent, it is submitted that broadening the scope of precedents

considered beyond personal property law is highly useful and rewarding. Thus, the law of

real property may well prove a more useful and appropriate source of guidance for a

property characterisation of crypto assets, and rights in crypto assets traded ‘at one

remove’ or more as valuable property in their own right.

4.5.2 Summary

This section examined the use of DLT at the third and final level of the existing market

infrastructure to be explored in this paper: between lower-tier intermediaries inter se. It found

that many of the property issues which arise will be premised on the law of intermediated

securities. Although detailed consideration of these issues is, therefore, beyond the scope of

this paper, for present purposes, it is worth noting that a DLT-enabled financial markets

infrastructure is likely to require not only consideration of digital assets, but a significant and

systematic reconsideration of the law on intermediated securities.

This area of financial property law has been largely neglected by the legislature,

notwithstanding the recognition by the Financial Markets Law Committee as early as 2002 that

proprietary interests in investment securities required clarification, subsequent

recommendations for legislation or regulation,36 and publication of a proposed draft domestic

35 Gray and Gray, Elements of Land Law (5th ed, OUP 2009), [1.3.5]; generally [1.3.1]-[1.3.5]. 36 Law Commission, ‘Fiduciary Duties of Investment Intermediaries’ (Law Comm No 350, 2014), [11.144]; [11.153]. The Law Commission had advised HM Treasury in 2008 that the UNIDOIT Convention on Substantive Rights Regarding Intermediated Securities should be ratified in ‘The

150

statute.37 Unhappily, these were unheeded in time to anticipate the insolvent collapse of the

Lehman Brothers Group in September 2008 and the challenge to English property law posed

by the subsequent litigation before the English courts. Although it has been argued that the

‘vigour and flexibility’ of the English law of trusts proved equal to this challenging and

unexpected application in high finance,38 a closer examination of the decisions of the courts

casts serious doubt over the extent to which the solutions then adopted are conceptually

robust, and therefore, viable long-term. 39 Superimposing DLT-enabled crypto-trading

practices, complete with their own set of legal challenges and uncertainties, upon the present

intermediated system, without more, therefore represents a high, arguably unacceptable, risk

of further legal uncertainty.

UNIDOIT Convention on Substantive Rules Regarding Intermediated Securities: Further Updated Advice to HM Treasury’ (May 2008), [3.36]. Having noted in 2014 that no progress had been made to do so, the Law Commission recommended that the UK government review the issue with a view to taking the lead in EU negotiations. 37 Financial Markets Law Committee, ‘Proprietary Interests in Investment Securities’ (Issue 3, July 2004). 38 MJ Briggs, ‘Has English Law Coped With the Lehman Collapse?’ [2013] 28 JIBFL 131. 39 This was the subject of a past paper, ‘Intermediation, Custody, and the Law of Trusts: Did English Law Cope with the Lehman Insolvency?’ (LL.M Research Paper, Commercial Law: Issues and Policies, Melbourne Law School, December 2017).

151

5. CONCLUSIONS

Simply saying ‘you should have chosen a better password’ won’t do; neither will ‘the

blockchain now says that your money belongs to Fred.’

Ross Anderson, Ilia Shumailov, Mansoor Ahmed and Alessandro Rietmann1

It has been written in the context of English real property law that “the world of the common

lawyer has always been a curious blend of the physical and the abstract, a commixture of the

earthily pragmatic and the deeply conceptual:”2

At one level, the common lawyer’s primary concern is with the observable

phenomenon of de facto possessory control as exercised over physically

identifiable terrain or premises. What actually happens on the ground – whether

rightly or wrongly – has always constituted a powerful determinant of entitlement

in English land law. The normative tug of sheer physical fact should never be

underestimated. Yet, at another level, the common law perception of property

embodies an obsession with the rational manipulation of abstract concepts and

with the careful outworking of axiomatic truths. Nowhere is this fascination with

the naked force of reason more apparent than in the law of land….in the hands of

the common lawyer, land law became a field of highly artificial concepts, each

defined with meticulous – almost mathematical – precision.3

Since Professor Gray et al were writing in 2007, intangible property has given common lawyers

a new subject of property upon which to focus the ‘fascination with the naked force of reason’

that may well surpass land in its complexity. If ‘the world of the common law’ has always

been a ‘commixture of the earthily pragmatic and the deeply conceptual,’ personal property

law has hitherto emphasised the former, arguably because it developed to accommodate the

1 R Anderson et al, ‘Bitcoin Redux’ (28 May 2018), [6.1] at 20. <https://weis2018.econinfosec.org/wcontent/uploads/sites/5/2018/05/WEIS_2018_paper_38.pdfblockchain.info > accessed 17 September 2018. 2 Gray and Gray, Elements of Land Law (5th ed, OUP 2009), [1.1.10]. 3 Gray and Gray (n 2), [1.1.11].

152

rise of international trade in goods and commodities from the 19th century.4 Whilst such

emphasis on the empirical and physical may not be problematic in itself, when combined with

the ‘repository’ nature of the English property taxonomy, such emphasis has unacceptably

hindered the development of intangible property law. It is submitted that the commercial

emphasis on tangible goods as the paradigm for personal property has obscured the basic

truth that ‘property’ in the legal sense is not concerned with things, but “a relationship of

socially approved control over a valued resource.”5

5.1. The Primary Question

Bitcoin arguably represents most faithfully this proposition; in the ‘curious blend’ of the physical

and abstract, there is very little of the physical to guide legal analysis by way of arguable

precedent. Both the private key and blockchain are highly abstract concepts with no definitive

physical existence factually comparable to traditional chattels or a title register. Nor is there

any precedent in law or fact of a subject of property which is characterised by, not one, but

two apparently competing incidents of property: the private key as the sole means of use,

benefit, and transfer of the asset; and the blockchain as the means to determining its value.

Hence, the primary property question arising with crypto assets: the relative weight to be given

to each of the private key and the blockchain as constituent parts of a comprehensive whole.

This study has shown that commercial practice and industry opinion on this point varies

considerably.

For some, such as Mr Antonopolous, Ms Kaminsky, the coding community, and the insurance

and custody sectors, the private key assumes such significance that it is taken as representing

the crypto property itself as a bearer asset. Such emphasis on the private key is readily

understood by reference to the ‘normative tug’ of sheer physical practice – if not quite ‘physical

fact’ – of control over the value allocated to public addresses. It was noted in Chapter 2 that

transferability is widely emphasised as the defining characteristic of property; indeed, it was

adopted as definitive for the purposes of this paper. Nevertheless, as a matter of fact, crypto

4 The preoccupation with tangible goods in the commercial context during this period can be seen in the Sale of Goods Act 1893, which codified the existing law, followed by the development of classical contract in the 20th century as an action its own right. 5 Gray and Gray (n 2), [9.1.15]; [1.5.11]. Also J Benjamin, Financial Law (OUP 2007), [16.03]: “all rights are rights against persons. Personal rights can be asserted only against particular persons…in contrast, property rights are rights, in respect of assets, which can be asserted against all persons generally. The phrase in rem denotes the compass, and not the subject of the right. It denotes that the right in question avails against persons generally.”

153

assets cannot be conflated with the private key for several reasons. First, such emphasis

does not give sufficient consideration to the fact that the value associated with the public

address is determined by cryptographic proofs underpinning clearing and settlement by the

blockchain. Second, there is no ‘coin’ or even value to be ‘transferred’ between users; the

blockchain records changes as to the distribution of value across the network. Hence, the

private key cannot be a bearer asset in the sense that, as a large and random number, it is

the asset which is transferred from one user to another.

By contrast, the Nivaura, Overstock, and ASX case studies have demonstrated that the

blockchain is often expressly intended to function as a definitive register of title. Crypto assets,

on this analysis, are registered property. This too is intuitive, especially given the clear

precedent that the transaction ledgers of a settlement system can serve as definitive record

of ownership, and the practical benefits which arise from relying on the blockchain as a single,

decentralised version of truth. However, the blockchain differs from all known title registers

and settlement systems in that the mechanisms for effecting entry on the register depend on

the pseudo-anonymous cryptography underpinning four numbers derived from the private key.

In addition, no other title register utilises a system in which applications to effect an entry on

the register are made through the ‘one time’ use of a private key which, having passed the

cryptographic proofs, are automatically and irreversibly registered. There is, therefore, no

room for rectification or amending a register underpinned by an unpermissioned network,

irrespective of whether an entry was procured by fraud or theft.

Given that the functions of the private key and the blockchain are interdependent, it is

submitted that exclusive emphasis on one or the other is insufficient for the purpose of legal

analysis. Critically, none of the positions examined, with the exception of that of Professor

Anderson et al, attempt to contextualise the chosen emphasis on either the blockchain or

private key within the operation of the network as a whole. Such an approach will result in a

fragmented system of legal property in crypto assets which lacks internal consistency. This is

plainly undesirable, especially given that another basic distinction – between unpermissioned

and permissioned networks – adds another fault line along which further fragmentation may

potentially develop.

In this regard, unpermissioned networks represent the more difficult challenge: theoretically,

due to the absence of any express agreements between users; practically, due to the pseudo-

anonymity of the networks and the difficulty in identifying and tracking down a defendant to

154

any potential claim. It is submitted that the latter issue is more appropriate for regulatory,

rather than private law, oversight. For the present private property law purposes, any

proposed system of ownership in crypto assets should be comprehensive; capable of

applying, in principle, to the vast range of blockchain applications seen in practice. Given that

the underlying code in all blockchain applications remain premised on the principles first used

in Bitcoin and Ethereum, it is submitted that the analysis must begin there.

Eschewing the intuitive emphasis on the private key, it was proposed that a collective

participation model encompassing all nodes best captured the ideology of users informally

subscribing to a system of decentralised trust. In the absence of express agreements between

such subscribers, the unincorporated association was identified as the most appropriate

vehicle to characterise an unpermissioned network. From this, it was proposed that adapting

the concept of shares or units in the more formalised associations, such as company or

investment fund, is useful for characterising the abstract entitlements which are attributed to

users. Whereas in the case of a financial asset, such abstract entitlement is the right to receive

a payment from the debtor, in Bitcoin or Ethereum, the entitlement is membership of or

participation in the ‘blockchain unincorporated association.’ Inextricable from this right is the

recognition by the unincorporated association that any given public address is allocated or

associated with a quantum of value. Users impliedly agree that the distribution of value across

the network of public addresses is determined by the rules of consensus implemented by and

recorded on the blockchain. In most cases, deterministic mathematical necessity and legal

entitlements will coincide, but as a matter of legal principle, the two should be considered

distinct. This is necessary, not least because the blockchain does not ascribe participation

values to legal persons, but to pseudo-anonymous key pairs.

Within this context, the blockchain simply functions as the clearing and settlement system

determining the distribution of value across public addresses according to the consensus

mechanism users implicitly agree will be used. The private key, on the other hand, functions

as an ID credential fundamental to exercising rights of ownership over any given quantum of

value ascribed to a public address. As such, it was proposed that the private key is most

appropriately characterised as definitive of the legal interest of possession in respect of the

underlying participation value in the ‘blockchain unincorporated association.’ Although the

characterisation of the private key as a rebuttable presumption of ownership, proposed by

Professor Anderson et al, was compelling, this proved inappropriate for applications where

the blockchain is expressly intended to be a register of title. Adopting the principle, though

155

workable for a bearer asset characterisation, would, therefore, risk internal inconsistency in a

broader, comprehensive system of property in cryptographic assets.

The consequent proposed private law characterisation of a crypto asset, therefore comprises

three distinct aspects: (i) an overarching ‘membership’ or ‘participation’ in a collective, which

in Bitcoin and Ethereum, is an unincorporated association; (ii) recognition within the

unincorporated association that participation involves value ascribed to individual members’

public addresses, which could called a ‘participation value’ and broadly classed alongside

company shares or units in a collective investment scheme; (iii) use of a private key to exercise

ownership rights of benefit, use, and transfer over such participation values, with the private

key representing the legal interest of possession in respect of these participation values. It is

submitted that this basic framework can apply, at least in principle, to all case studies

examined in this paper, irrespective of whether the network is open or closed, or whether the

crypto asset in question is expressly defined as registered or bearer property. Superimposing

a system of identifying legal persons with key pairs upon this theoretical construct is, it was

submitted, more properly within the remit of regulation or statute.

The obvious obstacle to such characterisation is the English common law resistance to the

propositions that intangibles, such as rights to recognition by a blockchain unincorporated

association of participation values, can be the subject of legal possession. Further complexity

is added by the fact that the interest of legal possession – itself a property interest in its own

right – is ultimately also an intangible, which further takes form as an intangible private key.

Such resistance, however, remains disappointing, and it is submitted, without any real legal

basis;6 there are ample precedents – in modern7 and historic8 common law authority, modern

6 This was a major thesis in a past paper, where further detail can be found: ‘Intermediation, Custody, and the Law of Trusts: Did English Law Cope with the Lehman Insolvency?’ (LL.M Research Paper, Commercial Law: Issues and Policies, Melbourne Law School, December 2017). 7 A Pye (Oxford) Ltd v Graham [2002] UKHL 30; [2003] 1 AC 419. Though that case concerned realty, the House of Lords, per Lord Browne-Wilkinson, applied the ordinary meaning of ‘possession,’ that is, “being the same in the law of trespass or conversion,” (paragraph 42) to hold that “it is not the nature of the acts which A does but the intention with which he does them which determines whether or not he is in possession” (paragraph 40). 8 Bevil’s Case, 4 Co Rep [8a]; JH Thomas (ed), The Reports of Sir Edward Coke in Thirteen Parts, Vol II (1826, Joseph Butterworth and Son, London), 268. The case concerned seisin, the ancient concept of possession in respect of land, of the tenurial services owed by the tenant to the lord as an incidental right owed under the lease. The Common Pleas found, at 4 Co Rep [10a] that “this word seisin should be construed according to the subject matter, sometimes for actual seisin, and sometimes for seisin in law.”

156

judicial attitudes,9 and modern10 and historic11 academic commentary – that such distinction

is not, or should no longer be, relevant for the purposes of property law. In comparative law,

EU legislation12 and the UNCITRAL Model Law on Electronic Transferrable Records 2017

recognise that possession can be used as an alternative to ‘control,’ and the German principle

of indirect possession is strikingly similar to the ancient English concept of ‘seisin in law.’13 If

possession is taken, therefore, as a concept of exercising control over the basic property rights

to transfer, use, and exclude, rather than as rooted in physical fact, it is submitted there is no

reason why the legal concept of possession could not be applied to abstract participation

values in a decentralised blockchain association. As has been recognised in English law as

recently as the 19th century in what remains one of the most authoritative treatises on the legal

interest of possession:

…the Subject matter of Possession is either capable or incapable […] of a complete

physical control applied to the thing as a whole […] It is not possible, as matter of fact,

to possess a house, a wood, or a field in the same manner as we possess the money in

our pockets, or the owner of a cart and horse possesses them when he is driving the horse in the cart […] What kind of acts, and how many, can be accepted as proof of

exclusive use, must depend to a great extent on the manner in which the particular kind

9 Re Lehman Brothers International (Europe) (Extended Liens) [2012] EWHC 2997 (Ch); [2014] 2 BCLC 295. The case concerned a purported lien over intangibles, and the judge was plainly of the view that the nature of the transaction and “clear desire of the [parties] to confer upon LBIE a general lien over assets comprised largely of intangibles.” Citing Lord Hoffmann on the ‘conceptually impossible’ in Re BCCI (No 8), the judge invited the parties to consider “whether the time had come for English property law to take a wider view of the [possession] matter.” The parties, however, unanimously declined. 10 Gray and Gray (n 2) at [2.1.7] suggest that “possession is an inherently behavioural phenomenon which incorporates a particular mind-set” and that “the former emphasis on exclusory intent has been commuted, in a large degree into a concern whether [a person] has engaged in a conscious furtherance of his own self-interest.” Similarly, Professor Palmer recognised that “possession itself is a relative phenomenon, scaled to the capacity of the subject matter to be possessed…in an extreme or novel case possession might even be equated with intellectual enjoyment or exploitation rather than with any physical dominion” in NE Palmer, Palmer on Bailment (3rd ed, 2009 Sweet and Maxwell), [30-034]. Professor Palmer cites the references to ‘quiet possession’ in the Sale of Goods Act 1979 s12(2)(b) and the Sale of Goods and Services Act 1982 s 7(2). The issue is also considered in AW Beaves, ‘Global Custody – A Tentative Analysis of Property and Contract’ in N Palmer and E McKendrick (eds) Interests in Goods (2nd ed, LLP 1998). 11 See, for example, F Pollock and RS Wright, Possession in the Common Law (Clarendon Press 1888). Pollock, too, recognised that the acts or facts proving ‘physical control’ were relative to the object; see text to fn 14 at 157 below. 12 Directive of the European Parliament and of the Council 2002/47/EC of 6 June 2002 on Financial Collateral Arrangements [2002] OJ L168/0043 Art 2(2) recognises that financial collateral may be ”delivered, transferred, held, registered or otherwise designated so as to be in the possession or under the control of the collateral taker.” 13 See fn 8 at 155 above.

157

of property is commonly used. When the object is as a whole incapable of manual

control, and the question is merely who has de facto possession, all that a claimant can do is to show that he…has been dealing with that object as an occupying owner might

be expected to deal with it, and that no one else has done so.14

Given the increasing treads toward digitisation of social and economic life where ID credentials

are a significant source of economic value and wealth, it is submitted that a return to a more

rational and abstract concept of possession is imperative for broader purposes beyond the

present context of property in crypto assets.

5.2. Cryptographic Financial Form

Cryptographic financial assets used in applications of DLT in the financial markets are, on

some level, easier subjects of legal property analyses. It is noteworthy that each case study

examined explicitly utilised the blockchain as a definitive register of title. Furthermore,

identified hierarchies of authority and express legal contracts renders recourse to implied

obligations and entitlements unnecessary. The need to undertake a more creative (and

contentious) property analysis is, thus, avoided: financial assets taking cryptographic form, as

surveyed, are simply registered property.

On a broader level, cryptographic form may seem to solve many of the problems of ownership

which arise in intermediated holdings. However, it has been shown that the ideal of

cryptographic financial assets as giving rise to a truly decentralised, disintermediated, peer-

to-peer financial markets is unlikely to be realised. This was found to be largely due to the

fact that the trust underpinning a financial asset – faith in a debtor’s promise to perform in the

unknown future – is of a different kind to that with which decentralised ledgers are concerned.

It was also found that there are two further significant reasons why use of intermediaries and

some form of centralised trust in the financial markets are likely to be retained. First, the

psychological tendency to delegate responsibilities associated with ownership of financial

property. It is worth noting that most of the case studies surveyed implement some form of

private key custody or node administration. LuxDeco-Nivaura makes use of a Key Custodian,

albeit on a ‘bare bailment’ model of self service through a PIN, which nevertheless shifts the

14 F Pollock and RS Wright, Possession in the Common Law (1888, Clarendon Press) [29] – [30]. Emphasis added.

158

responsibility of keeping private keys secure to cryptographic standards from users to the

custodian. The same security reasons were cited for the active decision to keep private keys

out of the hands of the investors the Overstock-tØ model. Here, private keys are held by

Overstock, Pro Securities, and the Sole Broker-Dealer, and investors give mandates through

the Sole Broker-Dealer to effect transfers through their online brokerage account. The ASX

offers managed nodes, and also likely holds private keys on behalf of indirect network

participants who wish to remain ‘off chain’ and continue to use the message-based system.

The second reason why intermediaries and centralised trust are likely to be retained stems

from the problems of pseudo-anonymity associated with truly decentralised unpermissioned

networks. Significantly, all case studies using public networks include some method for

identifying nodes with legal identities off-chain. In the LuxDeco-Nivaura model, the Key

Custodian’s records were anticipated as serving as an ID register. In the Overstock-tØ model,

the Sole Broker-Dealer is contractually obliged to share its database of client information with

the issuer and its agents. On the other hand, the ASX and the Eurex Repo system used in

the HQLAX solution are both established and permissioned platforms to which access is by

application and/or legal persons setting up an account.

Retention of intermediaries, however, need not mean any dilution of investors’ property rights

in financial assets. The assumption that intermediation necessarily results in lesser property

rights is arguably idiosyncratic to English law, arising as a result of the trusts law

characterisation of dematerialised and immobilised securities. The applications of DLT

surveyed, however, demonstrate clearly that intermediation need not mean any loss of rights

for investors: in the LuxDeco-Nivaura, HQLAX, Gemini Custody Account, and ASX DLT

solution case studies, investors are expressly conferred legal title to their crypto assets.

Similarly, in the Overstock-tØ application, entitlements as against the issuer are expressed as

being entered in the books of the Sole Broker-Dealer, not in ‘street name,’ but in the names of

individual investors.

Such intermediated holdings in which legal title is retained by investors is possible only if the

crypto asset is characterised as a right to registration on or recognition by the blockchain15

15 A similar concept has been proposed by KFK Low and E Teo in ‘Bitcoins and Other Cryptocurrencies as Property?’ (2017) 9(2) Law, Innovation and Technology 235. At [4.3], the authors suggest that ownership of a bitcoin could be conceived of as “the right to have one’s public bitcoin address appear as the last entry in the blockchain in relation to a particular bitcoin.” Many thanks to David Kreltszheim for drawing this article to my attention.

159

with a defined participation value; which is bailed to an intermediary through custody of the

private key. Such characterisation would, furthermore, be desirable from a policy perspective,

as investors holding title directly is a significant advance upon the strength of property rights

which investors currently enjoy in their financial assets. Given that modern commercial

trustees are typically exempted from the traditionally strict obligations and harsh personal

liability in respect of trust property, characterisation of the intermediary as a bailee for reward

does not disadvantage the investor in terms of the personal obligations owed under the

bailment agreement.

Such characterisation of intermediaries as bailees of recognition rights is premised upon the

proposal that crypto assets are essentially rights of participation in and recognition by a

collective association. This proposal is not inconsistent with the case studies examined. In

all but the LuxDeco bond, each case study utilised the familiar formalised collective vehicles

which have developed beyond the informal agreements of the unincorporated association and

are now rooted in express contracts or statutory regimes. For the Overstock preferred stock,

the vehicle is the familiar company or, alternatively, membership of the Pro Securities ATS.

Similarly, membership or access to the settlement system or trading platform in the ASX DLT

solution and HQLAx target operating model. In respect of LuxDeco, the apparent outlier, it is

worth noting that the traditional image of bondholders as dispersed and anonymous individuals

who trade their way out of a bad investment, rather than renegotiate the terms of a bond as a

collective16 is no longer entirely accurate. With the rise instruments such as co-co bonds,17

sovereign debt restructuring and bondholder activism,18 provisions for noteholder meetings in

bond documentation,19 and calls for the same fiduciary duties owed by company directors to

shareholders be also owed to bondholders,20 it is arguable that there is some recognition of

bondholders as a collective in commercial practice and in law.

16 P Wood, ‘Bondholders and Banks: Why the Difference in Protections?’ (2011) 6(2) CMLJ 188, 194. 17 ‘Contingent Convertible’ bonds convert to equity on defined triggers. 18 NML v Argentina remains the most high-profile case to date; see generally N Harrison and F Huntriss, ‘Hedge Funds and Litigation: a Brave New World’ (2015) 10(2) CMLJ 135. 19 For example, the German ‘Bond Law’ 2009 provides, in §7, for a ‘common representative’ (Gemeinsamer Vertreter) who owes the standard of care of ‘prudent business manager’ (ordentlichen und gewissenhaften Geschäftsleiters). See further Schuldverschreibungsgesetz vom 31 Juli 2009 (BGBl I S 2512), explored in a past paper, ‘The Legal Structures of Securitisation,’ (LL.M Research Paper, Debt Capital Markets, Melbourne Law School, June 2017). 20 AA Berle, ‘For Whom Corporate Managers Are Trustees: A Note’ (1932) 45 Harv LRev 1365, 1367-70; MW McDaniel, ‘Bondholders and Corporate Governance’ (1986) 41 Bus Law 413; H Kripke, ‘The SEC, Corporate Governance, and the Real Issues’ (1981) 36 Bus Law 173, 177; DR Fischel, The Corporate Governance Movement’ (1982) 35 Vand L Rev 1259, 1262; FH Easterbrook and DR

160

The obstacle, however, to such a fitting property characterisation is, yet again, the common

law insistence that abstract rights cannot be the subject of possession. It is submitted that

such insistence only strengthens the case for a more rational concept of possession which

recognises, as it once did, that possession should be construed in accordance with its subject

matter.

This is all the more pressing, given the extent to which the case studies have revealed the

extent of double reification of abstract obligations in crypto practice, that is, personal claims

against crypto intermediaries treated as transferrable and valuable economic assets in their

own right. This was demonstrated most explicitly by the HQLAX DCR, which is essentially a

tradeable cryptographic representation of an abstract entitlement relating to a traditional

intermediated security held ultimately with a tri-party agent, which itself holds the security

indirectly. Double reification is also apparent in the Coinbase User Agreement and Gemini

Depository Account, where the exchange users’ interests in the exchange’s own participation

values – associated with the exchange’s public address within the relevant network – are

traded amongst exchange members as freely transferrable assets. This degree of abstraction

is unprecedented in personal property law, yet the concept was noted as not dissimilar to the

doctrine of estates in real property. Interestingly, the concept is also apparent in financial

products such as securitisations: a single debt giving rise to a CDO, to a CDO2 and CDO3 and

so on. It is worth noting that such products were also traded as freely transferrable assets.

Two further property considerations which have arisen in the course of the study merit mention

here. First, potential changes in the norms surrounding title by register. The ASX DLT solution

anticipates that investor information stored potentially on-chain to streamline corporate actions

will necessitate potential changes to the ASX operating rules and statutory provisions which

expressly keep beneficial interests off-register. It is submitted that, although it is difficult to

argue why such records could not ultimately be considered the definitive register of title, this

would also be inconsistent with the law of trusts. It was submitted that a bailment

characterisation for the right conferred by entry on the register would be an appropriate

solution. Second, the HQLAX case study demonstrated that the law of intermediated securities

Fischel, ‘Voting in Corporate Law’ (1983) 26 JL&Econ 395, 396; BD Baysinger and HN Butler, ‘Race For the Bottom v.Climb to the Top: The ALl Project and Uniformity in Corporate Law’ (1985) 10 JCorpnL 431, 433. Explored in a past paper, ‘The Legal Structures of Securitisation,’ (LL.M Research Paper, Debt Capital Markets, Melbourne Law School, June 2017).

161

will also require reconsideration. If ‘crypto-enclaves’ are established between lower-tier

intermediaries, the characterisation of crypto assets traded at this level will necessarily be

premised upon the intermediated system. It is submitted that the shifts towards cryptographic

financial forms invite a welcome opportunity to clarify and refine of the law of intermediated

securities.

Finally, cryptographic financial assets which make use of smart contracts have raised novel

questions of personal liability which go to the heart of the first proposition with which this paper

began: that all financial assets are, in legal terms, substantively rights against other parties to enforce payment obligations. As was seen in the LuxDeco-Nivaura bond, replacing the

intermediaries associated with the performance of such payment obligations with smart

contracts gives rise to the potential for loss as a result of some unforeseeable and unexpected

programming error or flaw. It is not without some irony that the potential for the economic

value of a financial asset to be lost irrevocably through automated performance of the

obligation arises in a context where there are serious difficulties in identifying a defendant to

whom liability can be ascribed. This may, on the one hand, be more appropriately considered

a question of the commercial features of the financial asset, grounded in the law of obligations

and the novel question of personal liability for artificial intelligence and deterministic code.

Nevertheless, it is submitted that the issue is not wholly divorced from the issues of property

in cryptographic financial assets. Given that all financial assets are ultimately premised upon

a personal obligation, clarity in the framework of such personal obligations can only be

welcome as a useful complement to the law of property as a network of jural relationships over

a valued resource.

5.3. Final Conclusions

Financial assets have long suffered as the subject of property law, underpinned as they are,

by the abstract notion of a promise or obligation. Initially relegated to the final ‘left over’

category of ‘chose in action’ within the category for whatever was not a real interest in land,

the rise of the capitalist economy has in the past three centuries forced a social, political,

economic, and legal reconsideration as to the status of a mere promise as a source of

economic value. In the law of property, although makeshift property solutions by recourse to

the form in which financial obligations were recorded have been adopted to varying degrees

of legal and commercial success, such solutions have been ill-fit for purpose since at least the

162

1980s when immobilised and dematerialised forms became widespread in the financial

markets.

This legal analysis of modern financial forms has demonstrated the extent to which

cryptographic assets challenge common law concepts of ownership and property rights. The

apparent deficiencies in the law, most notably in the concept of possession, are arguably not

inherent in English property law generally; rather, they may be attributed to the rise of

international trade in goods and the consequent deeply empirical attitude to personal property

law. To remedy the resulting lacuna in the law, guidance should be taken from of a wealth of

precedents in diverse areas of law which, although not prima facie relevant to high finance or

fintech, upon substantive analysis are often more directly on point than personal property law

or financial regulation. In this study alone, such precedents have been drawn from areas of

law as varied as intellectual property, alternative investment funds, unincorporated

associations, and real property.

There is no doubt that cryptographic form of abstract financial obligations poses a unique

challenge for property law; perhaps one even greater than that posed by land as a socially

significant resource with physical and temporal dimensions beyond the human measure. On

one level, the absence of any obvious precedent may be daunting. On the other, the modern

the challenges for the law of property may be seen as a rare opportunity for the common law

to demonstrate its continued flexibility and creativity in adapting to novel challenges, not

through wholesale statutory interventions, but through centuries of established and continuous

precedent.

i

BIBLIOGRAPHY

Books

Atiyah PS, The Rise and Fall of Freedom of Contract (Clarendon Press, 1979; 1986 (printing)) Beaves AW, ‘Global Custody – A Tentative Analysis of Property and Contract,’ in N Palmer and E McKendrick (eds), Interests in Goods (2nd ed, LLP 1998) Benjamin J, Financial Law (OUP 2007) Blackett-Ord M and Haren S, Partnership Law (5th ed, Bloomsbury Professional 2015) Blackstone W, Commentaries on the Laws of England (W Prest (ed), OUP 2016) Braudel F (trans S Reynolds), Civilisation and Capitalism 15th-18 Century Vol II: The Wheels of Commerce (Book Club Associates (by arrangement with William Collins Sons & Co) 1983) Bridge M et al (eds), The Law of Personal Property (2nd ed, Sweet and Maxwell 2018) Commons J, The Legal Foundations of Capitalism (The Macmillan Company 1924) Ellinger EP et al, Ellinger’s Modern Banking Law (5th ed, OUP 2011) Fox D, ‘Cryptocurrencies in the Common Law of Property,’ in Fox D and Green S (eds) Cryptocurrencies in Private and Public law (OUP 2019) Fuller G, The Law and Practice of International Capital Markets (3rd ed, Lexis Nexis 2012) Gray K and Gray SF, Elements of Land Law (5th ed, OUP 2009) Gullifer L and Payne J (eds), Intermediated Securities (Hart 2010) Hill J and Bowes-Smith E, ‘Joint Ownership of Chattels’ in Palmer N and McKendrick E (eds), Interests in Goods (2nd ed, LLP 1998) Maitland F, Equity and The Forms of Action: Two Courses of Lectures (AH Chaytor and WJ Whittaker ed, CUP 1910) McKendrick E (ed), Goode on Commercial Law (5th ed 2016) Moss G, ‘Intermediated Securities; Issues Arising on Insolvency’ in L Gullifer and J Payne (eds), Intermediated Securities (Hart 2010) Nolan D and Davies J, ‘Torts and Equitable Wrongs’, in Burrows A (ed), English Private Law (3rd ed, OUP 2013) Palmer N, Palmer on Bailment (3rd ed, Sweet and Maxwell 2009)

-- and McKendrick E (eds), Interests in Goods (2nd ed, 1998, LLP)

ii

-- ‘Bailment,’ in A Burrows (ed), Oxford Principles of English Law: Private Law (3rd ed OUP 2013)

Palmer VV, The Paths to Privity: The History of Third Party Beneficiary Contracts at English Law (Austin & Winfield 1992) Pollock F and Wright RS, Possession in the Common Law (Clarendon Press 1888) Renner K, Institutions of Private Law and their Social Functions (Routledge & Keagan Paul, 1949, reprint ed 1976) Simpson AWB, A History of the Common Law of Contract: The Rise of the Action of Assumpsit (Clarendon Press 1975, (1987 printing))

-- ‘Innovation in Nineteenth Century Contract Law,’ in Legal Theory and Legal History: Essays on the Common Law (The Hambledon Press 1987)

Swadling W, ‘Property’ in A Burrows (ed), Oxford Principles of English Law: Private Law (3rd ed, OUP 2013)

Tucker L et al (eds), Lewin on Trusts (19th ed, 2015, Sweet and Maxwell)

Turing D, Clearing and Settlement (2nd ed, Bloomsbury Professional 2016) Yates M, International Settlement’ in Blair M et al (eds), Financial Markets and Exchanges Law (2nd ed, OUP 2012)

-- and Montagu G, The Law of Global Custody: Legal Risk Management in Securities Investment and Collateral (4th ed, Bloomsbury 2013)

Academic Articles Benjamin J, ‘Stewardship and Collateral,’ (LSE Law, Society and Economy Working Papers 7/2017) < https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2969829 > Briggs MJ, ‘Has English Law Coped With the Lehman Collapse?’ [2013] 28 JIBFL 131 Cohen R et al, ‘Automation and Blockchain in Securities Issuances,’ (2018) 3 JIBFL 144 Cope SR, ‘The Stock Exchange Revisited: a New Look at the Market in Securities in London in the Eighteenth Century,’ [1978] 45 (117) Economica, New Series 1 Low KFK and Teo E in ‘Bitcoins and Other Cryptocurrencies as Property?’ (2017) 9(2) Law, Innovation and Technology 235 Paech P, ‘The Governance of Blockchain Financial Networks’ (2017) < https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2875487 > accessed 18 December 2017

-- ’Integrating Global Blockchain Securities Settlement with Law and Regulation - Policy Consideration and International Principles‘ (2016)

iii

<papers.ssrn.com/sol3/papers.cfm?abstract_id=2792639> accessed 18 December 2017

Rix MS, ‘Company Law: 1844 and Today,’ (1945) 55 (218/219) The Economic Journal 252 Talbot L, ‘Enumerating Old Themes? Berle’s Concept of Ownership and the Historical Development of English Company Law in Context,’ [2010] 33(4) Seattle U L Rev 1201 Walch A, ‘The Bitcoin Blockchain as Financial Market Infrastructure: a Consideration of Operational Risk,’ (2015) 18(837) Legislation and Public Policy, 872-7 Winn JK, ‘Electronic Chattel Paper: Invitation Accepted,’ (25 September 2010), 5. Available at < https://ssrn.com/abstract=1682783 > or < http://dx.doi.org/10.2139/ssrn.1682783 > accessed 30 January 2020 Wood P, ‘Bondholders and Banks: Why the Difference in Protections?’ (2011) 6(2) CMLJ 188 Wright A and Filippi P, ‘Decentralised Blockchain Technology and the Rise of Lex Cryptographia’ (2015) < http://ssrn.com/abstract=2580664 > accessed 19 December 2017 Cases Agnew v Commissioners of Inland Revenue, also known as Re Brumark Investments Ltd [2001] UKPC 28 Armitage v Nurse [1998] Ch 241 B2C2 Ltd v Quoine Pte Ltd [2019] SGHC (I) 03 Barclays Bank Ltd v Quistclose Investments Ltd [1970] AC 567 (HL) Bourne v Mason (1669) 2 Keb 454, 457, 527; 1 Vent 6; 86 ER 5 Bristol and West Building Society v Mothew [1996] EWCA Civ 533 Caparo Industries Plc v Dickman [1990] 2 AC 605 (HL) Clypsam v Morris (1669) 2 Keb 401, 443, 453; 84 ER 278 Conservative and Unionist Central Office v Burrell [1982] WLR 522 Donoghue v Stevenson [1932] AC 562 (HL); [1932] UKHL 100 Fouldes v Willoughby (1841) 81 M & W 540; 151 ER 1153 Hardy v Hoade [2017] EWHC 2476 (Ch) Hedley Byrne & Co Ltd v Heller Partners Ltd [1964] AC 465 (HL) Hunter v Moss [1994] 1 WLR 452; [1994] 3 All ER 215 (CA); [1993] 1 WLR 934 (Ch) Longman v Bath Electric Tramways, Limited [1905] 1 Ch 646

iv

MCC Proceeds Inc v Lehman Brothers International (Europe) [1998] 4 All ER (CA) 675; [1998] 2 BCLC 659 W Nagel (a Firm) v Pluczenik Diamond Company NV [2018] EWCA Civ 2640 National Provincial Bank Ltd v Ainsworth [1965] AC 1175 (HL) OBG Ltd v Allan [2007] UKHL 21; [2008] 1 AC 1 Re Goldcorp Exchange Ltd [1995] 1 AC 74 Re Hudson (1885) 54 LJ Ch 881 Re Lehman Brothers International (Europe) (In Administration), also known as Lomas v RAB Market Cycles (Master) Fund Ltd [2009] EWHC 2545 (Ch) Re Lehman Brothers International (Europe) (In Administration), also known as Pearson v Lehman Brothers Finance SA (Lehman RASCALS) [2010] EWHC 2914 Re Lehman Brothers International (Europe) (In Administration) [2011] EWCA Civ 1544 Re Lehman Brothers International (Europe) (In Administration) (Extended Liens) [2012] EWHC 2997 (Ch); [2014] 2 BCLC 295 Re London Wine Company (Shippers) Limited [1986] PCC 121 Robinson v Harman (1848) 1 Ex 850; 154 ER 363 Rolls Royce Ltd v Jeffrey (Inspector of Taxes) [1962] 1 WLR 425 R v West, Southwark Crown Court, 14 December 2017 (unreported) Secure Capital SA v Credit Suisse AG [2017] EWCA Civ 1486 Smith v Hughes (1871) LR 6 QB 597 Spartan Steel and Alloys Ltd v Martin & Co Ltd [1973] QB 27 (CA) Speechley v Allott [2014] EWCA Civ 230 Tailby v Official Receiver (1888) 13 App Cas 523 Thomas v Thomas (1842) 2 QB 851 Warner-Lambert Co Ltd v Generics (UK) Ltd [2018] UKSC 56

UK Primary Legislation

Act To Restrain the number and ill Practice of Brokers and Stock-Jobbers 8 and 9 Wm III c 32 Companies Act 2006

v

Computer Misuse Act 1990 Financial Services and Markets Act 2000 Joint Stock Companies Act 1844 Land Registration Act 2002 Law of Property Act 1925 Partnerships Act 1890 Torts (Interference with Goods) Act 1977

EU Primary Legislation

Regulation (EU) No 648/2012 of the European Parliament and of the Council of 4 July 2012 on OTC derivatives, central counterparties and trade repositories [2012] OJ L 201/1 Directive of the European Parliament and of the Council 98/26/EC of 19 May 1998 on Settlement Finality in Payment and Securities Settlement Systems [1998] OJ L166/45 Directive of the European Parliament and of the Council 2002/47/EC of 6 June 2002 on Financial Collateral Arrangements [2002] OJ L168/43 Directive 2003/71/EC of the European Parliament and of the Council of 4 November 2003 on the prospectus to be published when securities are offered to the public or admitted to trading and amending Directive 2001/34/EC [2003] OJ L 345/64 Directive 2011/61/EU of the European Parliament and of the Council of 8 June 2011 on Alternative Investment Fund Managers and amending Directives 2003/41/EC and 2009/65/EC and Regulations (EC) No 1060/2009 and (EU) No 1095/2010 [2011] OJ L 174/1 Directive 2013/50/EU of the European Parliament and of the Council of 22 October 2013 amending Directive 2004/109/EC of the European Parliament and of the Council on the harmonisation of transparency requirements in relation to information about issuers whose securities are admitted to trading on a regulated market, Directive 2003/71/EC of the European Parliament and of the Council on the prospectus to be published when securities are offered to the public or admitted to trading and Commission Directive 2007/14/EC laying down detailed rules for the implementation of certain provisions of Directive 2004/109/EC [2013] OJ L 294/13 Directive 2014/57/EU of the European Parliament and of the Council of 16 April 2014 on criminal sanctions for market abuse [2014] OJ L 173/179 Directive 2014/65/EU of the European Parliament and of the Council of 15 May 2014 on markets in financial instruments and amending Directive 2002/92/EC and Directive 2011/61/EU [2014] OJ L 173/349 Directive 2014/91/EU of the European Parliament and of the Council of 23 July 2014 amending Directive 2009/65/EC on the coordination of laws, regulations and administrative provisions relating to undertakings for collective investment in transferable securities (UCITS) as regards depositary functions, remuneration policies and sanctions [2014] OJ L 257/186

vi

Directive (EU) 2015/849 of the European Parliament and of the Council of 20 May 2015 on the prevention of the use of the financial system for the purposes of money laundering or terrorist financing, amending Regulation (EU) No 648/2012 of the European Parliament and of the Council and repealing Directive 2005/60/EC of the European Parliament and of the Council and Commission Directive 2006/70/EC [2015] OJ L 141/73 Directive 2015/2366/EU of the European Parliament and of the Council of 25 November 2015 on payment services in the internal market, amending Directives 2002/65/EC, 2009/110/EC and 2013/36/EU and Regulation (EU) No 1093/2010, and repealing Directive 2007/64/EC [2015] OJ L 337/35 Directive (EU) 2018/843 of the European Parliament and of the Council of 30 May 2018 amending Directive (EU) 2015/849 on the prevention of the use of the financial system for the purposes of money laundering or terrorist financing, and amending Directives 2009/138/EC and 2013/36/EU [2018] OJ L 156/43

International and Other Jurisdictions

International UNCITRAL Model Law on Electronic Transferrable Records (2017)

Australia

Crimes Act 1958 (Vic) Partnerships Act 1958 (Vic) Property Law Act 1958 (Vic) Corporations Act 2001 Anti-Money Laundering and Counter Terrorism Financing Act 2006

Belgium Royal Decree No 62 of 10 November 1967

Germany

Civil Code Luxembourg

Law of 1 August 2001 on the circulation of securities, as amended, Mém. A 2001, No 106

vii

Spain

Consolidated Text of the Regulation of Sociedad de Sistemas (‘Iberclear Regulation’) as at 6 September 2017 < http://www.iberclear.es/ing/Regulations/Legal-Framework > accessed 9 April 2019.

United States of America

Trust Indenture Act 1939 15 USC §§77aaa-77bbbb (2012)

Investment Companies Act 1940 15 USC §§ 80a-1–80a-64 (2012) Uniform Commercial Code (UCC)

Policy and Other Reports ASIC’s Information Sheet 225, ‘Initial Coin Offerings and Crypto-Assets’ (May 2019 Update) < https://asic.gov.au/regulatory-resources/digital-transformation/initial-coin-offerings-and-crypto-assets/ > accessed 31 January 2020 Bank of International Settlements, Committee on Payments and Market Infrastructures Markets Committee, ‘Distributed Ledger Technology in Payment, Clearing, and Settlement: An Analytical Framework’ (February 2017, CPMI Paper No 157) < https://www.bis.org/cpmi/publ/d157.htm > accessed 3 November 2018

-- ‘Central Bank Digital Currencies’ (March 2018, CPMI Paper No 174) < https://www.bis.org/cpmi/publ/d174.htm > accessed 3 November 2018

European Securities and Markets Authority, ‘The Distributed Ledger Technology Applied to Securities Markets,’ (7 February 2017) < https://www.esma.europa.eu/sites/default/files/library/dlt_report_-_esma50-1121423017-285.pdf > accessed 5 January 2018 Financial Markets Law Committee, ‘Trustee Exemption Clauses: Analysis of the Role of the Trustee in the Wholesale Financial Markets and of the Proposals Contained in the Law Commission's Consultation Paper No 117’ (FMLC Issue 62, May 2004)

-- ‘Proprietary Interests in Investment Securities’ (Issue 3, July 2004) < www.fmlc.org > accessed 6 September 2017

-- ‘Issues of Legal Uncertainty Arising in the Context of Virtual Currencies’ (July 2016) < www.fmlc.org > accessed 18 June 2018

FINMA, ‘Guidelines for enquiries regarding the regulatory framework for initial coin offerings (ICOs),’ (16 February 2018) < https://www.finma.ch/en/news/2018/02/20180216-mm-ico-wegleitung/ > accessed 1 December 2018 Group of Thirty, ‘Clearance and Settlement in the World’s Securities Markets’ (1989)

viii

Journal of the House of Commons, ‘25 November 1696,’ 11 House of Commons Journal: 25 1693-1697 (London 1803), 593-598 < http://www.british-history.ac.uk/commons-jrnl/vol11/pp593-598 > accessed 5 April 2019 Law Commission of England and Wales, ‘Trustee Exemption Clauses’ (Law Com No 301 Cmmd 6874, 2006)

-- ‘The UNIDOIT Convention on Substantive Rules Regarding Intermediated Securities: Further Updated Advice to HM Treasury’ (May 2008)

-- ‘Fiduciary Duties of Investment Intermediaries’ (Law Comm No 350, 2014)

Reserve Bank of Australia, ‘Review of Settlement Practices for Australian Equities’ (May 2008) < https://www.rba.gov.au/payments-and-infrastructure/financial-market-infrastructure/clearing-and-settlement-facilities/consultations/review-practices/ > accessed 30 September 2018 Regulatory Filings and Legal Agreements ASX Settlement Operating Rules (1 August 2010) < https://www.asx.com.au/documents/rules/ASX_Settlement_Rules_Section_09.pdf > accessed 22 April 2019 Bitcoin Core User Licence < https://bitcoincore.org/en/download/ > accessed 15 July 201 Coinbase User Agreement < www.coinbase.com > accessed 20 January 2018 Ethereum Licencing < https://github.com/Ethereum/wiki/wiki/Licensing > accessed 18 June

2019

Gemini Custody Agreement < https://gemini.com/custody-agreement/> accessed 15 April 2019 Gemini User Agreement < www.gemini.com > accessed 20 January 2018 Morris and Rossetti, Individually and on Behalf of All Others v Overstock.com.Inc. and Ors, Class Action Complaint for Violations of Federal Securities Law, Demand for Jury Trial (Filed 29 March 2018), para 4. Reported by R Kahn, ‘Shareholder Class Action’ (Court House News, 30 March 2018) < https://www.courthousenews.com/wp-content/uploads/2018/03/SCA.Overstock.pdf > accessed 4 February 2019 Morris and Rossetti, Individually and on Behalf of All Others v Overstock.com.Inc. and Ors, Notice of Voluntary Dismissal <http://securities.stanford.edu/filingsdocuments/1065/O00_03/2018330_f01k_18CV00271.pdf > last accessed 19 June 2019 Open Source Initiative MIT Licence < https://opensource.org/licenses/mit-license.php > accessed 15 July 2018 Overstock Inc, Prospectus dated 9 December 2015 (Filed 11 December 2015)

ix

< http://investors.overstock.com/static-files/aeb7115e-cc0c-482a-9f44-69eade872e53 > last accessed 4 June 2019 Overstock Inc, Prospectus Supplement (To Prospectus dated 9 December 2015) dated 14 November 2016 (Filed 14 November 2016) < http://investors.overstock.com/static-files/39d5b2c0-1c69-4112-b0a5-552edd2a9a4c > last accessed 22 June 2019 t0.com Inc, Amended, Supplemented, and Restated Offering Memorandum dated 1 March 2018 < https://www.sec.gov/Archives/edgar/data/1130713/000110465918013731/a18-7242_1ex99d1.htm > accessed 1 April 2019

Programming Documents and Websites Antonopoulos A, Mastering Bitcoin: Programming the Open Blockchain (2nd ed, O’Reilly Media 2017)

-- and Wood G, Mastering Ethereum: Building Smart Contracts and DApps (O’Reilly Media 2019)

Beefchain Website < https://beefchain.com/ > accessed 18 January 2019 Brown G, ‘The Corda Platform: An Introduction,’ (May 2018, Version 2) < https://docs.corda.net/_static/corda-platform-whitepaper.pdf > accessed 13 October 2018 Corda Network Foundation Website < https://corda.network/ > accessed 18 April 2019 Digital Asset, ‘The Digital Asset Platform: Non-Technical White Paper’ (December 2016) < https://hub.digitalasset.com/hubfs/Documents/Digital%20Asset%20Platform%20-%20Non-technical%20White%20Paper.pdf > accessed 30 September 2018 Everledger Diamond Platform Website < https://diamonds.everledger.io/ > accessed 20 March 2018 Ethereum Github Website < https://github.com/ethereum > accessed 18 June 2019 Gibraltar Blockchain Exchange < https://gbx.gi > accessed 1 February 2019 JP Morgan, ‘Quorum White Paper’ (Version 2, 24 August 2018) <https://github.com/jpmorganchase/quorum/blob/master/docs/Quorum%20Whitepaper%20v02.pdf > accessed 17 March 2019 Lamport L et al, ‘The Byzantine Generals Problem’ (SRI International 1982) < https://people.eecs.berkeley.edu/~luca/cs174/byzantine.pdf > accessed 4 April 2019 Nakamoto S, ‘Bitcoin: A Peer-to-Peer Electronic Cash System’ (2008) <http://nakamotoinstitute.org/bitcoin/> accessed 5 January 2018 r3 Website < https://www.r3.com/ > accessed 8 August 2018 Swiss SIX Digital Exchange < https://www.six-group.com/en/site/digital-exchange.html > last accessed 26 June 2018

x

Wood G, ‘Ethereum: A Secure Decentralised Generalised Transaction Ledger,’ (‘the Yellow Paper, Byzantium Version 4e05aa0 4 March 2019) < https://github.com/ethereum/yellowpaper > accessed 24 March 2019

Industry Documents and Resources

ABILab et al – r3, Case Study: Italian banks pioneer the use of Corda Enterprise for interbank reconciliation—opening the way to a full production roll-out <https://www.r3.com/wp-content/uploads/2019/04/Spunt_CS_R32018.pdf > accessed 19 May 2019 Anderson R et al, ‘Bitcoin Redux’ (28 May 2018) <https://weis2018.econinfosec.org/wcontent/uploads/sites/5/2018/05/WEIS_2018_paper_38.pdfblockchain.info > accessed 17 September 2018 A Barbaschow, ‘Here’s What to Expect from ASX’s Blockchain-Based CHESS Replacement’ (ZDNet, 25 October 2018) < https://www.zdnet.com/article/heres-what-to-expect-from-asxs-blockchain-based-chess-replacement/ > accessed 19 June 2019 Buy Bitcoin Worldwide Website < https://www.buybitcoinworldwide.com/confirmations/ > accessed 4 April 2019 Clearstream Banking SA, ‘Customer Handbook’, (Document No 0021, Version 27 May 2019) CMS Legal Services EEIG, ‘Initial Coin Offerings: New Means of Fundraising,’ (March 2018) <https://cms.law/en/INT/Publication/Initial-Coin-Offerings-New-means-of-fundraising > accessed 19 April 2019 Cohen R et al, ‘Banking on the Blockchain,’ (February 2018) IFLR 24, < http://www.allenovery.com/SiteCollectionDocuments/Banking_On_The_Blockchain.pdf > accessed 30 March 2019 Coindesk Website < https://www.coindesk.com/price/Bitcoin > accessed 17 December 2018 Crown Prosecution Service News Centre, ‘Prolific Computer Hacker Jailed for 10 Years’ (25 May 2018) < https://www.cps.gov.uk/cps-london-north-london-south/news/prolific-computer-hacker-jailed-10-years > accessed 29 August 2018 CryptoBLK-r3, Case Study How R3 is working with CryptoBLK, HSBC and other banks and corporates to revolutionize and revitalize trade finance letters of credit, using the power of the Corda blockchain platform’< https://www.r3.com/wp-content/uploads/2019/04/CryptoBLK_CS_Jan2019.pdf > accessed 19 May 2019 Deutsche Börse, ‘Deutsche Börse and HQLA make significant progress on blockchain securities lending solution’ (Press Release, 29 January 2019) < https://www.deutsche-boerse.com/dbg-en/media/press-releases/Deutsche-B-rse-and-HQLAX-make-significant-progress-on-blockchain-securities-lending-solution--1413678 > accessed 19 December 2018 Euroclear Bank, ‘Rights of Participants to Securities deposited in the Euroclear System (July 2017) < https://ecsda.eu/wp-content/uploads/BE_Euroclear_Bank.pdf > accessed 4 May 2019

xi

Euroclear Bank Website < https://www.euroclear.com/services/en/banking-services-all-providers.html > last accessed 28 June 2019 European Central Bank: Eurosystem Website, < https://www.ecb.europa.eu/paym/coll/coll/triparty/html/index.en.html > accessed 1 June 2019 FCA Regulatory Sandbox Website < https://www.fca.org.uk/firms/regulatory-sandbox > last accessed 19 June 2019 Finestra-r3, ‘Case Study: How Finastra is harnessing R3’s Corda Enterprise blockchain to open up a new business line and transform transparency and efficiency in the syndicated loan market’ < https://www.r3.com/wp-content/uploads/2019/04/Finastra_CS_R32018pdf.pdf > accessed 19 May 2019 HQLAX Website < https://www.hqla-x.com/ > last accessed 26 June 2019 HQLAx & Deutsche Börse Group, ‘Target Operating Model’ < https://www.deutsche-boerse.com/resource/blob/1413686/d0619e3c15e557a8f566845c516db169/data/29jan2019-hqlax_en.pdf > accessed 1 May 2019 ISDA and Linklaters, ‘Whitepaper: Smart Contracts and Distributed Ledgers - A Legal Perspective’ (August 2017). Available at < https://lpslive.linklaters.com/en/about-us/news-and-deals/news/2017/smart-contracts-and-distributed-ledger--a-legal-perspective > accessed 18 December 2017 ISSA, ‘Distributed Ledger Technology: Principles for Industry-Wide Acceptance’ (June 2018) < https://www.issanet.org/e/pdf/2018-06_ISSA_DLT_report_version_1.0.pdf > accessed 28 October 2018

-- ‘Infrastructure for Crypto-Assets: A Review by Infrastructure Providers’ (October 2018) < https://www.issanet.org/e/pdf/2018-10_ISSA_report_Infrastructure_for_Crypto-Assets.pdf> accessed 28 October 2018

Kelly J, ‘Nine of the World’s Biggest Banks Join to From Blockchain Partnership’ (Reuters London 15 September 2015) < https://www.reuters.com/article/us-banks-blockchain/nine-of-worlds-biggest-banks-join-to-form-blockchain-partnership-idUSKCN0RF24M20150915 > accessed 8 August 2018 Kemp R, ‘The Fourth Industrial Revolution: Blockchain and Smart Contracts,’ (The Lawyer 6 June 2016) < https://www.thelawyer.com/issues/6-june-2016/the-fourth-industrial-revolution-blockchain-and-smart-contracts/ > accessed 9 September 2017 Kharti Y, ‘Craig Wright Ordered to Disclose Bitcoin Addresses in Kleiman Court Case,’ (Coindesk, 6 May 2019) < https://www.coindesk.com/craig-wright-ordered-to-disclose-bitcoin-addresses-in-kleiman-court-case > last accessed 2 June 2019 Ledger Website <https://www.ledger.com/ > accessed 4 April 2019 Leung J, ‘7 Legal Questions That Will Define Blockchain in 2019,’ (Coindesk, 3 January 2019) < https://www.coindesk.com/7-legal-questions-that-will-define-blockchain-in-2019 > accessed 4 January 2019

xii

Lloyd’s, ‘Bitcoin: Risk Factors for Insurance’ (2015, Lloyd’s Emerging Risk Report). Available at < www.lloyds.com > accessed 4 June 2018 Medici Website < https://www.mediciventures.com/ > last accessed 18 June 2019 Metz C, ‘Overstock.com Assembles Coders to Build a Bitcoin-ike Stock Market’ (Wired, 10 June 2014) < https://www.wired.com/2014/10/overstock-com-assembles-coders-build-bitcoin-like-stock-market/ > accessed 1 June 2019 Oliver Wyman and Euroclear, ‘Blockchain in Capital Markets: The Prize and the Journey’ (February 2016) < https://www.oliverwyman.com/content/dam/oliver-wyman/global/en/2016/feb/BlockChain-In-Capital-Markets.pdf > accessed 29 July 2018 Parker L, ‘Overstock Announces Cryptosecurity Exchange And World's First Crypto Bond (Brave New Coin, 7 June 2015) < https://bravenewcoin.com/insights/overstock-announces-cryptosecurity-exchange-and-worlds-first-crypto-bond > last accessed 2 June 2019 Quintez B, ‘Remarks at the 38th Annual GITEX Technology Week Conference,’ (October 2018) < https://www.cftc.gov/PressRoom/SpeechesTestimony/opaquintenz16 > accessed 4 January 2019 Securities Registrars Association Website, < http://sraa.asn.au/introduction-to-chess.html > accessed 4 April 2019 SEC Alternative Trading System (“ATS”) List Website, < https://www.sec.gov/foia/docs/atslist.htm > last accessed 2 June 2019 Thompson Reuters BlockOne IQ Website < https://blockoneiq.thomsonreuters.com/ > accessed 1 May 2019 Trezor Website < https://trezor.io/ > accessed 4 April 2019 Valkenburgh P, ‘Framework for Securities Regulation of Cryptocurrencies,’ (Version 2, Coin Centre August 2018) <https://coincenter.org/files/securities-cryptocurrency-framework-v2.1.pdf > accessed 24 November 2018 Vries A, ‘Bitcoin’s Growing Energy Problem’ (16 May 2018) Joule 2, 801–809 < https://www.cell.com/joule/fulltext/S2542-4351(18)30177-6 > accessed 30 June 2018 Watkins J, ‘Collateral Fears Driving Direct CCP Model’ Global Custodian (Winter 2017), 16

-- ‘Custody’s Big Moment: Cryptocurrency Custody,’ Global Custodian (Summer 2018), 30 -- ‘CSDs forced to defend their existence in a DLT World’ (The TRADE Crypto, 1 November 2018) <“https://www.thetradenewscrypto.com/csds-forced-defend-existence-dlt-world/ > accessed 7 June 2019

Wilmoth J, ‘Parity’s $150 Million Wallet Bug’ (CCN, 11 September 2017) < https://www.ccn.com/i-accidentally-killed-it-parity-wallet-bug-locks-150-million-in-ether > accessed 19 April 2019

xiii

Other BBC News, ‘Millions Using 123456 as Password, Security Study finds’ (BBC News, 21 April 2019) < https://www.bbc.com/news/technology-47974583 > accessed 21 April 2019 Graeber D, Debt: the First 5000 Years (Melville House 2011) Held A, Past Academic Papers:

-- ‘Privity of Contract and Contract Theory,’ (LL.B Dissertation, University of London, May 2015)

-- ‘The Legal Structures of Securitisation,’ (LL.M Research Paper, Debt Capital Markets, Melbourne Law School, June 2017) -- ‘Financial Fiduciaries,’ (LL.M Research Paper, Commercial Applications of Equity, Melbourne Law School, November 2017). -- ‘Intermediation, Custody, and the Law of Trusts: Did English Law Cope with the Lehman Insolvency?’ (LL.M Research Paper, Commercial Law: Issues and Policies, Melbourne Law School, December 2017)

-- ‘Bitcoins, Blockchains, and Decentralised Ledgers: Does Situs Actually Matter? (LL.M Dissertation, City Law School, City, University of London, September 2018)

Telephone conversation between R Cohen and author, 31 May 2019

Minerva Access is the Institutional Repository of The University of Melbourne

Author/s:

Held, Amy

Title:

Crypto-Financial Assets in a DLT-Based Market Infrastructure: Legal Principles of Ownership

and Obligation

Date:

2019

Persistent Link:

http://hdl.handle.net/11343/274809

File Description:

Complete Thesis, Library Copy

Terms and Conditions:

Terms and Conditions: Copyright in works deposited in Minerva Access is retained by the

copyright owner. The work may not be altered without permission from the copyright owner.

Readers may only download, print and save electronic copies of whole works for their own

personal non-commercial use. Any use that exceeds these limits requires permission from

the copyright owner. Attribution is essential when quoting or paraphrasing from these works.