{"id":744,"date":"2018-06-20T03:10:28","date_gmt":"2018-06-20T00:10:28","guid":{"rendered":"http:\/\/kusuaks7\/?p=349"},"modified":"2026-02-26T11:06:18","modified_gmt":"2026-02-26T11:06:18","slug":"the-two-cardinal-rules-of-cryptocurrency","status":"publish","type":"post","link":"https:\/\/www.experfy.com\/blog\/fintech\/the-two-cardinal-rules-of-cryptocurrency\/","title":{"rendered":"The Two Cardinal Rules of Cryptocurrency"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"744\" class=\"elementor elementor-744\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-59345081 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"59345081\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-316e3cae\" data-id=\"316e3cae\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6860d932 elementor-widget elementor-widget-text-editor\" data-id=\"6860d932\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<strong><em>Ready to learn Blockchain?\u00a0<a href=\"https:\/\/www.experfy.com\/training\/courses\">Browse courses<\/a>\u00a0like\u00a0<a href=\"https:\/\/www.experfy.com\/training\/courses\/blockchain-for-finance-professionals\">Blockchain for Finance Professionals<\/a> developed by industry thought leaders and Experfy in Harvard Innovation Lab.<\/em><\/strong>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-00777d5 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"00777d5\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-97f790e\" data-id=\"97f790e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ad6dc54 elementor-widget elementor-widget-heading\" data-id=\"ad6dc54\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\"><h4 id=\"c9f5\"><em><strong>The<\/strong><\/em><em><strong>\u00a0two cardinal rules of Cryptocurrency are the law of the public key and the law of the private key.<\/strong><\/em><\/h4><\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-554c386 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"554c386\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0e5484a\" data-id=\"0e5484a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-421e06b elementor-widget elementor-widget-heading\" data-id=\"421e06b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><h3><strong>The Cardinal Rules of Cryptocurrency<\/strong><\/h3>\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-5eee53d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5eee53d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d4c6251\" data-id=\"d4c6251\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f3d9d1e elementor-widget elementor-widget-text-editor\" data-id=\"f3d9d1e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p id=\"0694\">There are only two cardinal rules of cryptocurrency that arise directly from public key cryptography. As you probably know, modern cryptography is based on paired keys, a public key and a private key.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-b204397 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b204397\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-857bf86\" data-id=\"857bf86\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ee372b6 elementor-widget elementor-widget-heading\" data-id=\"ee372b6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><h4 id=\"b2bc\"><strong>The First Law: The Law of the Public Key<\/strong><\/h4>\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-e7fb68e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e7fb68e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b1a6a42\" data-id=\"b1a6a42\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9022f7d elementor-widget elementor-widget-text-editor\" data-id=\"9022f7d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p id=\"1186\">Because of the blockchain, public keys (and incidentally wallet addresses) should be verified before sending. Due to the principle of immutability and the lack of a trusted intermediary, there\u2019s no way to contest or reverse a transaction once it\u2019s been made.<\/p>\n<p id=\"d46d\">Written in the simplest terms possible, the law reads like this:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-a1ccf2b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a1ccf2b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-665491e\" data-id=\"665491e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5e7505c elementor-widget elementor-widget-text-editor\" data-id=\"5e7505c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<blockquote id=\"47ae\">Do not send any cryptocurrencies to the wrong address or you will have lost your money.<\/blockquote>\n<p id=\"0617\">This means that one of the most common attacks in Cryptocurrency is the phishing attack \u2014 when done directly against an individual, this is known as \u201cSpear Phishing\u201d.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-4ed61a6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4ed61a6\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4226ac5\" data-id=\"4226ac5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c82d3ac elementor-widget elementor-widget-text-editor\" data-id=\"c82d3ac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p id=\"9093\">Nerdy note (you can skip this paragraph if you are a beginner): Just to be technically clear, a Bitcoin address (for example) is not identical to a public key, but a cryptographic \u201chash\u201d of your public key. This means for example that you can generate a very large number of addresses that all represent the same public key, and this provides a measure of protection for your anonymity. But from the perspective of sending money, you should treat a bitcoin address similarly. We use the name \u201cthe law of the public key\u201d not because we are confused, but because the public and private keys are atomic to public key cryptography and the address is derived from the public key.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-c7a2435 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c7a2435\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0e9f5bb\" data-id=\"0e9f5bb\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d55b526 elementor-widget elementor-widget-text-editor\" data-id=\"d55b526\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p id=\"b393\"><a href=\"https:\/\/www.amazon.com\/Mastering-Bitcoin-Programming-Open-Blockchain\/dp\/1491954388\/ref=pd_lpo_sbs_14_t_0?_encoding=UTF8&amp;psc=1&amp;refRID=11W6CKG3YYWFA4VFHVW2\" target=\"_blank\" rel=\"noopener noreferrer\" data-href=\"https:\/\/www.amazon.com\/Mastering-Bitcoin-Programming-Open-Blockchain\/dp\/1491954388\/ref=pd_lpo_sbs_14_t_0?_encoding=UTF8&amp;psc=1&amp;refRID=11W6CKG3YYWFA4VFHVW2\" data->Mastering Bitcoin<\/a>\u00a0by Andreas Antonopolus. If you havent read this book you should! it is awesome, please buy the book and support a truly great guy.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-c77d0dd elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c77d0dd\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-807b77a\" data-id=\"807b77a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-80f54c6 elementor-widget elementor-widget-heading\" data-id=\"80f54c6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\"><h4 id=\"b096\"><strong>The Second Law: The Law of the Private Key<\/strong><\/h4>\n<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-1b8a74a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1b8a74a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3a15824\" data-id=\"3a15824\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d28b226 elementor-widget elementor-widget-text-editor\" data-id=\"d28b226\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p id=\"7ea9\">The second law is simply that the owner of the private key is the owner of the wallet and all the funds therein.<\/p>\n<p id=\"1d05\">In some ways this is one of the biggest flaws in custodial exchanges, which is at the end of the day the largest spectacular hacks in human history such as MtGOX and Coincheck are based on exceedingly simple principles. A custodial exchange typically secures its private key using some combination of obscurity and secure procedures. The problem is that in order to access the funds, some person or persons needs access to the key.<\/p>\n<p id=\"6e3b\">Whoever has access to the key can be compromised, and either an inside job can be executed or the key can be stolen. In either case, the money entrusted to the custodial exchange is gone.<\/p>\n<p id=\"6647\">Stated simply, the law reads like this:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-e94b1ea elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e94b1ea\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5a17e0e\" data-id=\"5a17e0e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f86fccd elementor-widget elementor-widget-text-editor\" data-id=\"f86fccd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<blockquote id=\"1f87\">The owner of the private key owns the cryptocurrencies. If you don\u2019t know who that is, it isn\u2019t you.<\/blockquote>\n<p id=\"c416\">What does the second law mean with respect to custodial exchanges including almost all of the popular exchanges in the world? It means that their customers have NO STANDING on ANY blockchain with respect to their assets.<\/p>\n<p id=\"3ce4\">Stated another way, if you don\u2019t control your own private keys, y<strong><em>ou don\u2019t own any cryptocurrencies<\/em><\/strong>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>There are only two cardinal rules of cryptocurrency that arise directly from public key cryptography. As you probably know, modern cryptography is based on paired keys, a public key and a private key. Because of the blockchain, public keys and incidentally wallet addresses should be verified before sending. Due to the principle of immutability and the lack of a trusted intermediary, there&rsquo;s no way to contest or reverse a transaction once it&rsquo;s been made.The second law is simply that the owner of the private key is the owner of the wallet and all the funds therein.<\/p>\n","protected":false},"author":300,"featured_media":3970,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[192],"tags":[98],"ppma_author":[1910],"class_list":["post-744","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-fintech","tag-blockchain"],"authors":[{"term_id":1910,"user_id":300,"is_guest":0,"slug":"miko-matsumura","display_name":"Miko Matsumura","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","user_url":"","last_name":"Matsumura","first_name":"Miko","job_title":"","description":"Miko Matsumura is General Partner at Gumi Cryptos and Cofounder at Evercoin Exchange. He is also a venture partner with BitBull Capital and an advisor to Arrington XRP Capital.&nbsp; As Chief Evangelist for the Java Language and Platform, he participated in the first wave of the Internet and is now fully engaged in the crypto-fueled Internet of value.&nbsp;"}],"_links":{"self":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/744","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/users\/300"}],"replies":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/comments?post=744"}],"version-history":[{"count":4,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/744\/revisions"}],"predecessor-version":[{"id":38284,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/744\/revisions\/38284"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media\/3970"}],"wp:attachment":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media?parent=744"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/categories?post=744"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/tags?post=744"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/ppma_author?post=744"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}