Digital Asset Custody and Risk Management Analysis
Source: Notion | Last edited: 2024-12-03 | ID: 1502d2dc-3ef...
Insights from Jonathan Marshall’s Industry Experience
Section titled “Insights from Jonathan Marshall’s Industry Experience”Custody Solutions Evaluation
Section titled “Custody Solutions Evaluation”Jonathan Marshall, drawing from over a year’s intensive evaluation of custody solutions including Copper and Komainu, addresses the evolving landscape of risk transfer and custody solutions. His detailed analysis reveals a particular affinity for Komainu's approach, which distinguishes itself through flexible hardware configurations — offering both hardware security modules (HSM) and multi-party computation (MPC) setups based on client preference. These setups, he emphasizes, transcend mere technical sophistication to provide robust legal and structural safeguards through complete asset segregation from Komainu's operations. This segregation ensures assets remain protected even in extreme scenarios like defaults or “acts of God.” Jonathan’s emphasis on blockchain technology extends to practical implementations, specifically recommending Ledger for cold storage solutions, complemented by tripartite agreements with exchanges like OKX that mirror assets at competitive rates of 20-50 basis points on assets under custody.
Custody Solution Implementation
Section titled “Custody Solution Implementation”In addressing Terry’s concerns about implementation, Jonathan outlines a sophisticated custody solution involving Komainu, OKX, and third-party payers, referencing similar structures developed with the Trebuchet group. The proposed framework includes intricate provisions for various scenarios, including Axon incapacitation, ensuring Eon maintains wallet access through Komainu's system. This arrangement, while complex, builds on established precedents and aims to balance security with operational flexibility.
Custodial Recovery Framework
Section titled “Custodial Recovery Framework”The custodial recovery framework merits particular attention in Komainu's implementation. Their system enables a sophisticated third-party payer arrangement, where both Axon and counterparties maintain separate custody wallets within the ecosystem. This structure, fortified by cold storage options through Ledger, creates a robust recovery mechanism: should Axon become incapacitated or operationally compromised, designated third parties retain controlled access to the assets. The framework’s elegance lies in its four-party architecture - Axon, counterparty, Komainu, and OKX - all bound by contractual agreements that ensure asset accessibility while maintaining rigorous security protocols. This arrangement, proven through previous implementations with the Trebuchet group, demonstrates how modern custody solutions can balance immediate access requirements with long-term security considerations, all while maintaining competitive cost structures at 20-50 basis points of assets under custody.
Governance and Technical Integration
Section titled “Governance and Technical Integration”The discussion of custody arrangements reveals the intricate balance between technical capability and practical governance. Jonathan’s experience with the Trebuchet group demonstrates how custody solutions must evolve beyond pure technical security to address complex operational scenarios, such as organizational incapacitation. The proposed multi-party structure, involving Komainu, OKX, and third-party payers, represents an attempt to create a robust governance framework that maintains operational efficiency while protecting all stakeholders’ interests. This approach acknowledges that modern custody solutions must address not just the “how” of asset security but also the “what if” of various organizational scenarios.
Operational Challenges and Strategic Considerations
Section titled “Operational Challenges and Strategic Considerations”The conversation culminates in a detailed discussion of practical challenges, particularly regarding OKX's VIP tier system. Jonathan explains the unique progression mechanics — clients must either operate at VIP 5-6 or leap directly to VIP 8 through volume commitments, with no intermediate VIP 7 access. He candidly assesses the limitations of their current position, noting that while $5 million in assets suffices for testing, it provides minimal leverage for tier negotiations, especially as monthly KPIs continue to rise. The discussion concludes with Jonathan advocating for a balanced approach between immediate operational needs and strategic objectives, while emphasizing that Eon’s comfort with the solution remains paramount — a consideration that supersedes even the extensive KYC and AML requirements they’ve implemented.
Strategic Asset Management
Section titled “Strategic Asset Management”Jonathan’s practical assessment of implementation challenges reveals the delicate balance between immediate operational needs and strategic positioning. While $5 million in assets provides adequate testing capacity, it offers limited leverage in tier negotiations with major exchanges, particularly as monthly KPIs continue to escalate. This reality constrains the ability to secure optimal trading terms and emphasizes the need for strategic asset growth to enhance negotiating positions.
Market Structure and Industry Analysis
Section titled “Market Structure and Industry Analysis”Market Structure and Exchange Analysis
Section titled “Market Structure and Exchange Analysis”When Terry Li probes about industry sustainability, Jonathan presents a nuanced view of centralized exchanges, acknowledging inherent risks while expressing measured confidence in established players like Binance and OKX — though carefully qualifying this with regulatory dependencies. His endorsement of Hidden Road stems from direct experience, having spent considerable time with their London team developing Route 28, their synthetic exchange powered by Crossover Markets technology. Jonathan reveals his pioneering role with Komainu and OKX, particularly in developing MVP iterations of custody products. He notes the significant time investment required — six to eight months for MVP0 alone — while acknowledging Victor’s potential concerns about added complexity despite his belief in the solution’s future significance.
Industry Relationships and Experience
Section titled “Industry Relationships and Experience”Jonathan’s analysis is deeply informed by his personal relationships within the industry, particularly his extensive work with the London team at Hidden Road and his involvement in developing MVP iterations with Komainu. These direct experiences shape his measured optimism about certain solutions while maintaining a pragmatic view of their limitations.
Industry Transformation and Prime Broker Evolution
Section titled “Industry Transformation and Prime Broker Evolution”The discussion shifts to Jonathan’s analysis of industry transformation, particularly the decline of traditional prime broker models under regulatory pressure. He details the systematic dismantling of key services: the elimination of managed sub-accounts (MSAs), the removal of direct market access (DMA), and the end of pass-through fee tiers. This evolution has forced adaptations, exemplified by Matrixport's pivot to smart order routing with their Phoenix product. Jonathan critically assesses the diminishing value proposition of prime brokers against established solutions from Talos and Aqua, noting that Eon had previously found their own in-house execution capabilities sufficient without such routing services.
Market Model Evolution
Section titled “Market Model Evolution”The evolution of the prime broker landscape reveals a deeper industry pattern that Jonathan identifies: the gradual shift from traditional intermediary models toward more direct, technology-driven solutions. He particularly notes how prime brokers are being forced to reinvent themselves, with some pivoting toward borrow-and-lend models — a direction he views with skepticism given the cautionary tales of Celsius and BlockFi. This transformation reflects a broader industry tension between innovation and stability, where new business models emerge in response to regulatory pressures but carry their own inherent risks.
Hidden Road’s Innovations
Section titled “Hidden Road’s Innovations”Hidden Road’s Distinctive Features
Section titled “Hidden Road’s Distinctive Features”Responding to Terry’s inquiries about specific advantages, Jonathan elaborates on Hidden Road's distinctive features. Their UK-regulated synthetic exchange eliminates traditional slippage through direct price matching, while offering sophisticated credit terms — 5x default leverage with a notably lenient 24-48 hour notice period for margin calls, contrasting sharply with standard exchange practices. The platform’s recent addition of FIX protocol compatibility enhances its appeal, though Jonathan notes the necessity of adapting existing trading strategies to their non-order book market structure.
Market Structure Innovation
Section titled “Market Structure Innovation”Jonathan’s detailed analysis of Hidden Road’s synthetic exchange model reveals an important shift in market structure thinking. By moving away from traditional order book systems toward direct price matching, the model promises to eliminate slippage — a significant advantage for institutional traders. However, this structural change would require fundamental adjustments to existing trading strategies, highlighting the constant balance between pursuing improved execution conditions and maintaining operational continuity. The UK regulatory framework adds another layer of consideration, offering the clarity of a single, well-defined jurisdiction in contrast to the “hydra-like” nature of international exchanges with multiple licenses across jurisdictions.
Appendix: Institutional Digital Asset Security Infrastructure
Section titled “Appendix: Institutional Digital Asset Security Infrastructure”Hardware Security Modules (HSM) vs Multi-Party Computation (MPC)
Section titled “Hardware Security Modules (HSM) vs Multi-Party Computation (MPC)”In the institutional digital asset custody landscape, two primary security architectures have emerged as industry standards: Hardware Security Modules (HSM) and Multi-Party Computation (MPC). Each offers distinct advantages for different deployment scenarios.
HSMs represent the traditional approach, providing physical security devices that create tamper-resistant environments for cryptographic operations. These modules establish clear trusted computing boundaries and include sophisticated tamper detection systems that trigger automatic resets when threats are detected. Their proven track record in banking and payment networks, coupled with availability through major cloud providers like AWS and Google Cloud Platform, makes them a cornerstone of institutional-grade security infrastructure.
MPC presents a more recent innovation in cryptographic security, enabling distributed signature issuance without exposing private keys. This approach excels in threshold signature schemes, allowing for flexible M of N quorum arrangements (where ‘M’ represents the minimum number of participants required out of ‘N’ total participants to authorize a transaction, similar to requiring multiple signatures on a bank check). While primarily focused on the signature layer of transactions, MPC’s software-based nature makes it particularly suitable for mobile and server applications, offering deployment flexibility that hardware-based solutions cannot match.
The security-performance tradeoff between these approaches reveals their complementary nature. HSMs deliver hardware-based security with certified assurance levels and superior performance for complex operations, typically introducing only 20% to 2x overhead for most workloads. MPC, while potentially introducing higher latency due to multi-party communication, distributes risk across multiple parties and offers greater deployment flexibility.
Industry experts, particularly in institutional contexts, increasingly advocate for hybrid implementations that leverage both technologies’ strengths. This combined approach typically incorporates:
- HSM’s robust hardware security foundations
- MPC’s distributed key management capabilities
- Additional security controls for comprehensive protection This hybrid architecture proves especially valuable for banking-grade full SaaS custody solutions and high-assurance digital asset custody operations where both security and operational flexibility are paramount considerations.