{"id":612,"date":"2018-07-13T17:13:59","date_gmt":"2018-07-13T21:13:59","guid":{"rendered":"https:\/\/www.amp.legal\/blog\/?p=612"},"modified":"2018-07-13T19:38:38","modified_gmt":"2018-07-13T23:38:38","slug":"blockchain-anonymity-ban-cuts-risk","status":"publish","type":"post","link":"https:\/\/www.amp.legal\/blog\/blockchain-anonymity-ban-cuts-risk\/","title":{"rendered":"Blockchain Anonymity Ban Cuts Risk"},"content":{"rendered":"<p>Cryptocurrency imitates the key features of traditional currency and adds the advantages of providing transaction transparency and user anonymity. As invented by an <a href=\"https:\/\/www.mintdice.com\/blog\/bitcoin-vs-ethereum-vs-litecoin\" target=\"_blank\" rel=\"noopener noreferrer\">anonymous programmer<\/a>, the core nature of cryptocurrency is built around the concept of anonymity. In fact, one of the biggest selling points for cryptocurrency is the anonymity of the transactions.<\/p>\n<p>Traders of cryptocurrency prefer to keep their transactions private for various reasons. Yet, cryptocurrency transactions are not completely anonymous. Instead, the transactions are actually \u201c<a href=\"https:\/\/securingtomorrow.mcafee.com\/mcafee-labs\/staying-anonymous-on-the-blockchain-concerns-and-techniques\/\" target=\"_blank\" rel=\"noopener noreferrer\">pseudoanonymous<\/a>\u201d because the <a href=\"https:\/\/www.amp.legal\/blog\/blockchain-tech-innovations-continue\/\">blockchain<\/a> ledger is public. For example, although a person\u2019s name or address stays hidden, the person may be linked to a public <a href=\"https:\/\/www.mintdice.com\/blog\/bitcoin-vs-ethereum-vs-litecoin\" target=\"_blank\" rel=\"noopener noreferrer\">Bitcoin<\/a> address.<\/p>\n<h3>Crackdown on Anonymity<\/h3>\n<p>Countries\u00a0around the world are struggling with regulating cryptocurrency. Government officials are afraid that the anonymity of cryptocurrency creates an easy method for criminals to commit cyber crimes, such as extortion, fraud, money laundering, tax evasion, and identity theft.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"size-medium wp-image-621 alignleft\" style=\"float: left; padding-right: 1em;\" src=\"https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2018\/07\/masks-1-300x167.jpg\" alt=\"\" width=\"300\" height=\"167\" srcset=\"https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2018\/07\/masks-1-300x167.jpg 300w, https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2018\/07\/masks-1-768x427.jpg 768w, https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2018\/07\/masks-1-700x389.jpg 700w, https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2018\/07\/masks-1-520x289.jpg 520w, https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2018\/07\/masks-1-360x200.jpg 360w, https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2018\/07\/masks-1-250x139.jpg 250w, https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2018\/07\/masks-1-100x56.jpg 100w, https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2018\/07\/masks-1.jpg 900w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>An article from CoinCentral, <a href=\"https:\/\/coincentral.com\/south-korean-law-firm-files-constitutional-appeal\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>South Korean Law Firm Files Constitutional Appeal Against Exchange Regulations<\/em><\/a>, by Colin Harper, explains how one country is trying to crack down on cryptocurrency crimes. In late 2017, the South Korean government required exchanges to verify the identity of an account holder. This requirement bans anonymous trading and only allows transfers through \u201creal-name accounts.\u201d Opponents vowed to fight the ban in court on the grounds that the new rules were unconstitutional.<\/p>\n<h3>Risk Avoidance with AML and KYC<\/h3>\n<p>In the United States, banks must follow <a href=\"https:\/\/www.sec.gov\/about\/offices\/ocie\/amlsourcetool.htm\" target=\"_blank\" rel=\"noopener noreferrer\">Anti-Money Laundering<\/a> (AML) regulations. The Bank Secrecy Act (BSA) of 1970 established a framework for a variety of regulations to prevent unlawful transactions.<\/p>\n<p>After 9\/11 and the global financial crisis, Congress <a href=\"https:\/\/www.worldfinance.com\/wealth-management\/the-clash-between-kyc-and-cryptocurrencies\" target=\"_blank\" rel=\"noopener noreferrer\">enacted rigorous requirements<\/a> to banking regulations. As part of the Patriot Act, banks must follow the \u201cKnow Your Customer\u201d (KYC) rule, which strengthened the BSA. <a href=\"https:\/\/fin.plaid.com\/articles\/kyc-basics\" target=\"_blank\" rel=\"noopener noreferrer\">KYC requires<\/a> banks to identify their customers and conduct due diligence to determine potential risks.<\/p>\n<p>The <a href=\"https:\/\/hackernoon.com\/kyc-aml-and-cryptocurrencies-4e4cf929c151\" target=\"_blank\" rel=\"noopener noreferrer\">AML and KYC<\/a> rules form a basic structure to regulate cryptocurrency. However, these rules work against anonymity, which is the foundational philosophy of the blockchain. Regardless of the founding principles, many cryptocurrency exchanges require their customers to complete an account verification process to avoid risks. Meanwhile, the <a href=\"https:\/\/www.cnbc.com\/2018\/03\/27\/a-complete-guide-to-cyprocurrency-regulations-around-the-world.html\" target=\"_blank\" rel=\"noopener noreferrer\">governments\u00a0around the world<\/a> continue to integrate the AML and KYC rules into their cryptocurrency regulations.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cryptocurrency imitates the key features of traditional currency and adds the advantages of providing transaction transparency and user anonymity. As invented by an anonymous programmer, the core nature of cryptocurrency is built around the concept [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":613,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[35],"tags":[59,34,84,87],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Blockchain Anonymity Ban Cuts Risk - Cyber Law Blog<\/title>\n<meta name=\"description\" content=\"Cyber Law Blog explores legal topics with technology including privacy law and cybersecurity.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.amp.legal\/blog\/blockchain-anonymity-ban-cuts-risk\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Blockchain Anonymity Ban Cuts Risk - Cyber Law Blog\" \/>\n<meta property=\"og:description\" content=\"Cyber Law Blog explores legal topics with technology including privacy law and cybersecurity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.amp.legal\/blog\/blockchain-anonymity-ban-cuts-risk\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Law Blog\" \/>\n<meta property=\"article:published_time\" content=\"2018-07-13T21:13:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-07-13T23:38:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2018\/07\/Mask-Art.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alice M. Porch, Esq., CIPP\/US, C|EH, Security+\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alice M. Porch, Esq., CIPP\/US, C|EH, Security+\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.amp.legal\/blog\/blockchain-anonymity-ban-cuts-risk\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.amp.legal\/blog\/blockchain-anonymity-ban-cuts-risk\/\"},\"author\":{\"name\":\"Alice M. Porch, Esq., CIPP\/US, C|EH, Security+\",\"@id\":\"https:\/\/www.amp.legal\/blog\/#\/schema\/person\/2abed582dc9fbf067a8aa30d3e21453f\"},\"headline\":\"Blockchain Anonymity Ban Cuts Risk\",\"datePublished\":\"2018-07-13T21:13:59+00:00\",\"dateModified\":\"2018-07-13T23:38:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.amp.legal\/blog\/blockchain-anonymity-ban-cuts-risk\/\"},\"wordCount\":372,\"publisher\":{\"@id\":\"https:\/\/www.amp.legal\/blog\/#organization\"},\"keywords\":[\"bitcoin\",\"blockchain\",\"cryptocurrency\",\"privacy\"],\"articleSection\":[\"Blockchain\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.amp.legal\/blog\/blockchain-anonymity-ban-cuts-risk\/\",\"url\":\"https:\/\/www.amp.legal\/blog\/blockchain-anonymity-ban-cuts-risk\/\",\"name\":\"Blockchain Anonymity Ban Cuts Risk - Cyber Law Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.amp.legal\/blog\/#website\"},\"datePublished\":\"2018-07-13T21:13:59+00:00\",\"dateModified\":\"2018-07-13T23:38:38+00:00\",\"description\":\"Cyber Law Blog explores legal topics with technology including privacy law and cybersecurity.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.amp.legal\/blog\/blockchain-anonymity-ban-cuts-risk\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.amp.legal\/blog\/blockchain-anonymity-ban-cuts-risk\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.amp.legal\/blog\/blockchain-anonymity-ban-cuts-risk\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.amp.legal\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blockchain Anonymity Ban Cuts Risk\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.amp.legal\/blog\/#website\",\"url\":\"https:\/\/www.amp.legal\/blog\/\",\"name\":\"Cyber Law Blog\",\"description\":\"Exploring technology law in cyberspace\",\"publisher\":{\"@id\":\"https:\/\/www.amp.legal\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.amp.legal\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.amp.legal\/blog\/#organization\",\"name\":\"Alice M. Porch, P.A.\",\"url\":\"https:\/\/www.amp.legal\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.amp.legal\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2017\/08\/AMP-Logo.png\",\"contentUrl\":\"https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2017\/08\/AMP-Logo.png\",\"width\":1104,\"height\":1114,\"caption\":\"Alice M. Porch, P.A.\"},\"image\":{\"@id\":\"https:\/\/www.amp.legal\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.amp.legal\/blog\/#\/schema\/person\/2abed582dc9fbf067a8aa30d3e21453f\",\"name\":\"Alice M. Porch, Esq., CIPP\/US, C|EH, Security+\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.amp.legal\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b0913e4ef042f9c502b709824db43e8f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b0913e4ef042f9c502b709824db43e8f?s=96&d=mm&r=g\",\"caption\":\"Alice M. Porch, Esq., CIPP\/US, C|EH, Security+\"},\"description\":\"Alice is a member of the Florida Bar, and she focuses on data privacy and cybersecurity compliance. She attended the Warrington College of Business at the University of Florida and earned a Bachelor of Science in Business Administration. After graduating, she earned a Juris Doctor at the Stetson University College of Law. During law school, she served as an Assistant Executive Editor for Stetson Law Review and also as a Staff Editor for Stetson Journal of Advocacy and the Law. She also served as a member of The Florida Bar Journal\/News Editorial Board from 2018-2024. She is currently a member of the Florida Bar Cybersecurity and Privacy Law Substantive Law Committee.\",\"sameAs\":[\"https:\/\/www.aliceporch.com\",\"https:\/\/www.linkedin.com\/in\/alice-m-porch\/\"],\"url\":\"https:\/\/www.amp.legal\/blog\/author\/amplegal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Blockchain Anonymity Ban Cuts Risk - Cyber Law Blog","description":"Cyber Law Blog explores legal topics with technology including privacy law and cybersecurity.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.amp.legal\/blog\/blockchain-anonymity-ban-cuts-risk\/","og_locale":"en_US","og_type":"article","og_title":"Blockchain Anonymity Ban Cuts Risk - Cyber Law Blog","og_description":"Cyber Law Blog explores legal topics with technology including privacy law and cybersecurity.","og_url":"https:\/\/www.amp.legal\/blog\/blockchain-anonymity-ban-cuts-risk\/","og_site_name":"Cyber Law Blog","article_published_time":"2018-07-13T21:13:59+00:00","article_modified_time":"2018-07-13T23:38:38+00:00","og_image":[{"width":900,"height":500,"url":"https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2018\/07\/Mask-Art.jpg","type":"image\/jpeg"}],"author":"Alice M. Porch, Esq., CIPP\/US, C|EH, Security+","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Alice M. Porch, Esq., CIPP\/US, C|EH, Security+","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.amp.legal\/blog\/blockchain-anonymity-ban-cuts-risk\/#article","isPartOf":{"@id":"https:\/\/www.amp.legal\/blog\/blockchain-anonymity-ban-cuts-risk\/"},"author":{"name":"Alice M. Porch, Esq., CIPP\/US, C|EH, Security+","@id":"https:\/\/www.amp.legal\/blog\/#\/schema\/person\/2abed582dc9fbf067a8aa30d3e21453f"},"headline":"Blockchain Anonymity Ban Cuts Risk","datePublished":"2018-07-13T21:13:59+00:00","dateModified":"2018-07-13T23:38:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.amp.legal\/blog\/blockchain-anonymity-ban-cuts-risk\/"},"wordCount":372,"publisher":{"@id":"https:\/\/www.amp.legal\/blog\/#organization"},"keywords":["bitcoin","blockchain","cryptocurrency","privacy"],"articleSection":["Blockchain"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.amp.legal\/blog\/blockchain-anonymity-ban-cuts-risk\/","url":"https:\/\/www.amp.legal\/blog\/blockchain-anonymity-ban-cuts-risk\/","name":"Blockchain Anonymity Ban Cuts Risk - Cyber Law Blog","isPartOf":{"@id":"https:\/\/www.amp.legal\/blog\/#website"},"datePublished":"2018-07-13T21:13:59+00:00","dateModified":"2018-07-13T23:38:38+00:00","description":"Cyber Law Blog explores legal topics with technology including privacy law and cybersecurity.","breadcrumb":{"@id":"https:\/\/www.amp.legal\/blog\/blockchain-anonymity-ban-cuts-risk\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.amp.legal\/blog\/blockchain-anonymity-ban-cuts-risk\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.amp.legal\/blog\/blockchain-anonymity-ban-cuts-risk\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.amp.legal\/blog\/"},{"@type":"ListItem","position":2,"name":"Blockchain Anonymity Ban Cuts Risk"}]},{"@type":"WebSite","@id":"https:\/\/www.amp.legal\/blog\/#website","url":"https:\/\/www.amp.legal\/blog\/","name":"Cyber Law Blog","description":"Exploring technology law in cyberspace","publisher":{"@id":"https:\/\/www.amp.legal\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.amp.legal\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.amp.legal\/blog\/#organization","name":"Alice M. Porch, P.A.","url":"https:\/\/www.amp.legal\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.amp.legal\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2017\/08\/AMP-Logo.png","contentUrl":"https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2017\/08\/AMP-Logo.png","width":1104,"height":1114,"caption":"Alice M. Porch, P.A."},"image":{"@id":"https:\/\/www.amp.legal\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.amp.legal\/blog\/#\/schema\/person\/2abed582dc9fbf067a8aa30d3e21453f","name":"Alice M. Porch, Esq., CIPP\/US, C|EH, Security+","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.amp.legal\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b0913e4ef042f9c502b709824db43e8f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b0913e4ef042f9c502b709824db43e8f?s=96&d=mm&r=g","caption":"Alice M. Porch, Esq., CIPP\/US, C|EH, Security+"},"description":"Alice is a member of the Florida Bar, and she focuses on data privacy and cybersecurity compliance. She attended the Warrington College of Business at the University of Florida and earned a Bachelor of Science in Business Administration. After graduating, she earned a Juris Doctor at the Stetson University College of Law. During law school, she served as an Assistant Executive Editor for Stetson Law Review and also as a Staff Editor for Stetson Journal of Advocacy and the Law. She also served as a member of The Florida Bar Journal\/News Editorial Board from 2018-2024. She is currently a member of the Florida Bar Cybersecurity and Privacy Law Substantive Law Committee.","sameAs":["https:\/\/www.aliceporch.com","https:\/\/www.linkedin.com\/in\/alice-m-porch\/"],"url":"https:\/\/www.amp.legal\/blog\/author\/amplegal\/"}]}},"_links":{"self":[{"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/posts\/612"}],"collection":[{"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/comments?post=612"}],"version-history":[{"count":12,"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/posts\/612\/revisions"}],"predecessor-version":[{"id":627,"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/posts\/612\/revisions\/627"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/media\/613"}],"wp:attachment":[{"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/media?parent=612"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/categories?post=612"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/tags?post=612"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}