This note reflects my own opinions, which should not be attributed to the Bank of Italy. For the sake of brevity, I do not provide an introduction to crypto in the note. Interested readers may find a good starting point in Levine (2022), The Crypto Story. More references can be found in my paper What’s next for crypto?.
(a.i) layer 1s (L1), also called blockchains, where final settlement of transactions4 happens;
(a.ii) secondary infrastructure, e.g. tools for scaling L1 capacity, optimizing transaction flow, moving assets across different L1s, and managing L1-application interactions;
b) an application layer, where applications as different as trading venues and video games exist.
The contemporary crypto ecosystem is composed of several L1s, with attendant secondary infrastructure, and a large number of applications. Products in all categories exist on a continuum that goes from “managed by a limited number of humans” (centralized) to “managed by immutable code deployed on a blockchain” (decentralized). Most existing laws focus on two portions of the application layer – centralized finance (CeFi) and centralized token issuance. This level of the stack matters for all regulatory goals mentioned above, but it is perhaps most relevant for consumer protection, given the high concentration of retail interest.
Laws protecting CeFi users have existed for a while in several countries, and now they are being reinforced significantly. For example, under the new EU crypto statutes, exchanges will have strong obligations with respect to the safekeeping of client funds. The legislation also mandates standards for governance and transparency, very problematic areas in the field.5 New cybersecurity rules aim at guarding against hacks.
Extra attention has been directed to stablecoins, i.e. tokens whose value is supposedly pegged to a fiat currency or other real-world assets. Promises notwithstanding, crypto history is ripe with stablecoins that lost their peg and collapsed. Stablecoin use can impact financial stability and monetary sovereignty. The EU now mandates that stablecoins be backed by audited reserves, and envisions volume caps in some cases.
Other unsolved issues exist in the centralized application space, such as conflicts of interest, competition, and privacy. Most of them can be mapped to TradFi or non-crypto tech equivalents. While adjustments in regulatory tooling could still be beneficial (see Section 5), no radical change in paradigm is needed.
Security issues also affect secondary infrastructure. Bridges that allow for the movement of assets across L1s have proven vulnerable to hacks. There is a degree of opacity in some application programming interfaces (APIs) provided by centralized companies, and other off-chain infrastructure components.
a) KYC/AML. Currently, an entity seeking to access regulated financial services (traditional or CeFi) needs to go through KYC/AML verification. The process is repeated whenever a service provider is added. This results in dispersion of sensitive personal data. Meanwhile, DeFi users remain anonymous, with increased risk of illicit activity. Regulators could condition access to any financial service, centralized or not, to the possession of a non-tradable token, issued e.g. by a public authority, which attests to successful KYC/AML verification12,13. Zero-knowledge proofs14 could ensure that service providers only get access to the information they need, and not to any other data stored in the token. In turn, the token issuer could be algorithmically bound to only use the information gathered for certain purposes;
b) Stress testing. The open-source nature of smart contracts means that anyone can try to break them. This has been exploited for criminal ends, but also opens an opportunity for legitimate stress testing in pre-production phase. For example, supervisors could verify whether a DeFi lending protocol has sufficient safeguards against market manipulation, or the accumulation of bad debt in case of liquidation cascades. More generally, crypto’s “Don’t trust, verify” habit – a collective red-teaming of sorts – is healthy from a regulatory point of view, both in abstract terms and because of the accumulation of knowledge and data it created;
c) Balance-sheet audits. After the 2022 collapses, there was a rekindling of the debate on proofs of reserves (PoR). Those are cryptographic constructs which, say, an exchange can leverage to credibly show that they still have customer funds. Current implementations are imperfect15, and even in the future it is unlikely that algorithms alone can prove the solvency of a company. PoR may still be useful to supervisors as a time-saving aid for human-led audits;
Source for this and other market data in the paper: coinmarketcap.com.
This is a simplified version of the taxonomy in Armour et al (2016), Principles of Financial Regulation.
Crypto technology is not meant for financial applications exclusively. In blockchain parlance, a transaction is a piece of information conveying any change in the state of the world. Here I focus on the financial system alone.
Besides allegedly engaging in outright crime, FTX also had chaotic governance and no formal accounting system.
This analogy was proposed by Chris Dixon, a partner at the US venture capital firm Andreessen Horowitz, on the Web3 with a16z podcast.
Lummis-Gillibrand Responsible Financial Innovation Act, introduced in the US Senate on July 6, 2022.
For more on this, see OECD (2022), Why Decentralized Finance Matters and the Policy Implications.
There are instances of centralized (permissioned) L1s, e.g. enterprise blockchains. I will not focus on them here because they do not constitute a majority of the ecosystem, and also do not require particularly innovative approaches.
For an introduction to MEV on the institutional side, one can refer e.g. to R. Auer, J. Frost and J. M. Vidal Pastor (2022), Miners as Intermediaries: Extractable Value and Market Manipulation in Crypto and DeFi, BIS Bulletin 58. On the industry side, see e.g. this episode of the 0xResearch podcast, from crypto research and media company Blockworks.
For example, the EU recently published a tender for a Study of Embedded Supervision of Decentralized Finance.
KYC portability is not new and can be solved through other means. See e.g. the literature on verifiable credentials.
For a discussion of tokens of this type see for example E. G. Weyl, P. Ohlhaver, and V. Buterin (2022), Decentralized Society: Finding Web3’s Soul, mimeo.
Zero-knowledge proofs were born in the 1980s. For applications in crypto ecosystem, see here.
See V. Buterin (2022), Having a Safe CEX: Proof of Solvency and Beyond for an example of advanced research.
For a technical discussion in the context of Ethereum, see here.
See here for an overview of Flashbots, the market leader in this area, and here for market dominance statistics.
MEV could also provide an ideal starting point for a reflection on enforcement in global permissionless L1s. Compared to the case of sanctions mentioned in Section 4, it is not as politically charged, and could catalyze broader agreement.