Crypto assets built on blockchain technology were only introduced in 2008 and remain in the early stages of development. In addition, different crypto assets are designed for different purposes. Bitcoin, for instance, was designed to serve as a peer-to-peer electronic cash system, while Ethereum was designed to be a smart contract and decentralized application platform. Many other crypto networks-ranging from cloud computing to tokenized securities networks-have only recently been established. The further growth and development of any crypto assets and their underlying networks and other cryptographic and algorithmic protocols governing the creation, transfer and usage of crypto assets represent a new and evolving paradigm that is subject to a variety of factors that are difficult to evaluate, including:
- many crypto networks have limited operating histories, have not been validated in production, and are still in the process of developing and making significant decisions that will affect the design, supply, issuance, functionality and governance of their respective crypto assets and underlying blockchain networks, any of which could adversely affect their respective crypto assets;- many crypto networks are in the process of implementing software upgrades and other changes to their protocols, which could introduce bugs, security risks or adversely affect the respective crypto networks;- several large networks, including Bitcoin and Ethereum, are developing new features to address fundamental speed, scalability and energy usage issues. If these issues are not successfully addressed, or are unable to receive widespread adoption, it could adversely affect the underlying crypto assets;- security issues, bugs and software errors have been identified with many crypto assets and their underlying blockchain networks, some of which have been exploited by malicious actors. There are also inherent security weaknesses in some crypto assets, such as when creators of certain crypto networks use procedures that could allow hackers to counterfeit tokens. Any weaknesses identified with a crypto asset could adversely affect its price, security, liquidity and adoption. If a malicious actor or botnet (a volunteer or hacked collection of computers controlled by networked software coordinating the actions of the computers) obtains a majority of the compute or staking power on a crypto network, as has happened in the past, it may be able to manipulate transactions, which could cause financial losses to holders, damage the network's reputation and security, and adversely affect its value;- the development of new technologies for mining, such as improved application-specific integrated circuits (commonly referred to as ASICs), or changes in industry patterns, such as the consolidation of mining power in a small number of large mining farms, could reduce the security of blockchain networks, lead to increased liquid supply of crypto assets and reduce a crypto's price and attractiveness;- if rewards and transaction fees for miners or validators on any particular crypto network are not sufficiently high to attract and retain miners, a crypto network's security and speed may be adversely affected, increasing the likelihood of a malicious attack;- many crypto assets have concentrated ownership or an "admin key," allowing a small group of holders to have significant unilateral control and influence over key decisions related to their crypto networks, such as governance decisions and protocol changes, as well as the market price of such crypto assets;- the governance of many decentralized blockchain networks is by voluntary consensus and open competition, and many developers are not directly compensated for their contributions. As a result, there may be a lack of consensus or clarity on the governance of any particular crypto network, a lack of incentives for developers to maintain or develop the network and other unforeseen issues, any of which could result in unexpected or undesirable errors, bugs or changes, or stymie such network's utility and ability to respond to challenges and grow; and - many crypto networks are in the early stages of developing partnerships and collaborations, all of which may not succeed and adversely affect the usability and adoption of the respective crypto assets.
Various other technical issues have also been uncovered from time to time that resulted in disabled functionalities, exposure of certain users' personal information, theft of users' assets and other negative consequences, and which required resolution with the attention and efforts of their global miner, user and development communities. If any such risks or other risks materialize, and in particular if they are not resolved, the development and growth of crypto may be significantly affected and, as a result, our business, operating results, and financial condition could be adversely affected.