Digital assets built on blockchain technology were only introduced in 2008. Digital assets are designed for different purposes. Bitcoin, for instance, was designed to serve as a peer-to-peer electronic cash system, while Ethereum was designed to be a smart contract and decentralized application platform. Many other crypto networks, ranging from cloud computing to tokenized securities networks, have only recently been established. The further growth and development of any crypto assets and their underlying networks and other cryptographic and algorithmic protocols governing the creation, transfer, and usage of crypto assets represent a new and evolving paradigm that is subject to a variety of factors that are difficult to evaluate, including:
- many crypto networks have limited operating histories, have not been validated in production, and are still in the process of developing and making significant decisions that will affect the design, supply, issuance, functionality, and governance of their respective crypto assets and underlying blockchain networks, any of which could adversely affect their respective crypto assets;- many crypto networks are in the process of implementing software upgrades and other changes to their protocols, which could introduce bugs, security risks, or adversely affect the respective crypto networks;- security issues, bugs, and software errors have been identified with many digital assets and their underlying blockchain networks, some of which have been exploited by malicious actors. There are also inherent security weaknesses in some digital assets, such as when creators of certain crypto networks use procedures that could allow hackers to counterfeit tokens. Any weaknesses identified with a digital asset could adversely affect its price, security, liquidity, and adoption. If a malicious actor or botnet (a volunteer or hacked collection of computers controlled by networked software coordinating the actions of the computers) obtains a majority of the compute or staking power on a crypto network, as has happened in the past, it may be able to manipulate transactions, which could cause financial losses to holders, damage the network's reputation and security, and adversely affect its value;- if rewards and transaction fees for miners or validators on any particular crypto network are not sufficiently high to attract and retain miners, a crypto network's security and speed may be adversely affected, increasing the likelihood of a malicious attack;- algonomic units to U.S. dollar may fail causing devaluation in specific cryptocurrencies which may impact the market perception of safer currencies; and - many crypto networks are in the early stages of developing partnerships and collaborations, all of which may not succeed and adversely affect the usability and adoption of the respective crypto assets.
Various other technical issues have also been uncovered from time to time that resulted in disabled functionalities, exposure of certain users' personal information, theft of users' assets, and other negative consequences, and which required resolution with the attention and efforts of their global miner, user, and development communities. If any such risks or other risks materialize, and in particular if they are not resolved, the development and growth of crypto may be significantly affected and, as a result, our business, operating results, and financial condition could be adversely affected.