![Close up photo of Bitcoin and coins Bitcoin money on background,close up](https://coingeek.com/wp-content/uploads/2023/08/Close-up-photo-of-Bitcoin-and-coins-380x188.webp)
Papers associated with Bitcoin and related topics in Law: Part XXII
Bitcoin was created in line with the law, yet many misconceptions about the technology and blockchain, remain, including with regard to privacy, anonymity, and traceability.
Bitcoin was created in line with the law, yet many misconceptions about the technology and blockchain, remain, including with regard to privacy, anonymity, and traceability.
Once an investor has dominion and control over the staking rewards, they become taxable income, says the IRS in latest ruling, despite SEC’s staking crackdown.
In this Masterclasses series, Dr. Craig Wright says CBDCs' concept isn't particularly novel, but it still takes some technological and cultural shifts to bring that functionality to the masses.
Buffone Law Group issued the memo warning that Ethereum’s move to proof-of-stake and the Ethereum 2.0 staking programs offered by exchanges amount to illegal securities under the Howey test.
Delays recorded in settling transactions in Ethereum last week weren't all that serious, developers working on the issue said but admitted that it required fixing before risks tied to security mount.
The White House proposes the Digital Asset Mining Energy (DAME) excise tax on such operations, which would phase in to equal 30% of their total energy costs.
Blockchain is a technology that does more than just tracking and tracing transactions, but could also have massive impacts on the environment, social responsibility, and governance.
The NYAG filed charges against exchange KuCoin last week over failing to register as a securities and commodities broker-dealer while ETH was expressly labeled a security in the charges.
In an interview with CoinGeek, Ian Grigg explains how Triple Entry Accounting enhances the centuries-old methods of double-entry bookkeeping by introducing a third ledger.
A Senate hearing focusing on block reward mining in the U.S. debated the benefits of increased disclosures for miners while witnesses pointed to the real-world impacts of mining operations.
To be classified as a security, the "investment," the "efforts," and the "third party" identified in the Howey test should not be completely unrelated to any interest in the "common enterprise."
Security researcher James Edwards posted a four-part description of how the AvalancheGo vulnerability works, noting that it is only present in the Golang implementation of the Avalanche Protocol.