Skip to main content
The Cryptocurrency Security Model

Pindar Wong

Internet pioneer & Managing Director, VeriFi, Hong Kong

The Cryptocurrency Security Model

No one is going to ring a bell when there’s a disruptive tech, and no one is going to ring the bell when you are being the one that is disruptive. This is a very key moment in time when there are changes being made to the digital architecture, and we need to recognize that there is a new game that can be played. This game is new enough that we can set the rules of the game the way that we want to set them. Bitcoin has come from a bad boy technology akin to the internet, but innovators know that it could be pressed into service for improving security economics, repurposing this bad boy technology into something that can be used well.

To read the full research paper, Subscribe.

Reflections on India’s Foreign Policy
Nirupama Rao
Former Foreign Secretary, GOI
Reflections on India’s Foreign Policy
Securing Critical Infrastructure
Melissa Hathaway
President, Hathaway Global Strategies
Securing Critical Infrastructure
Information Technology Express
Dr. A.J. Paulraj
Marconi Prize, Stanford University
Information Technology Express
The Myth Of A New World Order
Joseph S. Nye
Fmr Dean, Kennedy School at Harvard Uty
The Myth Of A New World Order
Rethinking Counter- terrorism
Sir David Omand
Former Director of GCHQ
Rethinking Counter- terrorism
Europe: Not as free, Not as secure
Carl Bildt
Former Swedish Prime Minister
Europe: Not as free, Not as secure