04.06.2017 Views

Whitepaper - Factom With Cover

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

The second attack is obviously solved by using <strong>Factom</strong>, while the first is not so obvious. As this<br />

paper doesn’t focus on the mechanics of exchanges audits, we won’t delve in the nitty-gritty<br />

details. However, the basic concept is that by having frequent time-stamped copies of the<br />

exchanges database Merkle hash, one could detect the inclusion or exclusive of large balances<br />

before or after audits. Then, the auditor could simply look into those large inclusions or<br />

exclusions, manually. Remember, the trader will ultimately need to get his money on or off the<br />

exchange at some point, and that’ll show up in either the bank history or the Bitcoin transfer<br />

history.<br />

There are established process for detecting such fraudulent tactics in the traditional audit<br />

industry; however, it all starts with having accurate, verifiable, immutable time-series of the<br />

information in question.<br />

29

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!