What determines dominion and control for crypto assets considering hard forks (resulting in chain-splits) and airdrops?

What determines dominion and control for crypto assets

Author: Kirk Phillips, CPA, CMA, CFE, CBP
Published: March 31, 2020


D&C segue  

Determining what constitutes dominion and control (D&C) for crypto assets requires a technical understanding of hard forks and airdrops and, more specifically, hard forks resulting in chain splits.  

The tax significance of chain splits and airdrops, including the character of income, timing, and other tax-related issues, will be addressed in other white papers. This paper intends to identify actions exerted by taxpayers with their crypto assets manifesting dominion and control at a  particular point in time.  

Acquire the ability  

The critical distinction for income recognition is contingent on whether a taxpayer exercises dominion and control. A taxpayer would not recognize income until and unless they exercise dominion and control. Taxpayers have dominion and control when they “acquire the ability” to transfer, sell, exchange, or otherwise dispose of the cryptocurrency.  

The following IRS guidance affirms this definition of dominion and control:  

The IRS Virtual Currency FAQs (October 2019) A.23 states, “…you have dominion and control  over the cryptocurrency so that you can transfer, sell, exchange, or otherwise dispose of the  cryptocurrency.” 1

Rev. Rul. 2019-24, states, “If the taxpayer later acquires the ability to transfer, sell, exchange, or  otherwise dispose of the cryptocurrency, the taxpayer is treated as receiving the cryptocurrency at  that time.” 2

If “acquiring the ability” can be distinguished, then dominion and control can be determined.  Furthermore, the AICPA suggests chain-split coins and airdrops are unsolicited property referring to Rev. Rul. 70-498 and Rev Rul. 63-225, wherein both situations the mere receipt of unsolicited property, for example, free samples, did not constitute income. The taxpayer has to “accept the property,” and possession does not automatically equal acceptance. 3

Hard fork and airdrop confusion 

The terms fork and airdrop aren’t used in practice consistently, and there isn’t a standard definition,  especially when it comes to airdrops. A hard fork resulting in a chain-split and an airdrop are two completely independent and unrelated events. The terminology used in the recent IRS guidance  refers to “receiving cryptocurrency from an airdrop following a hard fork,” which is alternatively  referred to as “a hard fork followed by an airdrop.” These events are distinctly different and never happen simultaneously or consecutively in any related way. Coin Center echoed the sentiment,  “…it is mistaken to believe that forks and airdrops are sequentially related events.” 4 Similarly, the  AICPA stated, “Many taxpayers interpreted the ruling as not applying to either the Ethereum or  the Bitcoin chain splits since neither was a hard fork followed by an airdrop.” 5

Different forks  

The term “fork” has several different meanings in the blockchain context, which creates additional confusion. The two most common definitions are “forking the codebase,” referring to copying the codebase of open source software to create a new blockchain and “blockchain forks,” which may or may not result in a chain split. Also, there are hard forks and soft forks, however hard forks, or consensus-based rule changes, are not backward compatible. Only hard forks can result in chain splits as a result of the incompatibility. Hard forks are sometimes referred to as if they are synonymous with chain-splits; however, only hard forks resulting in chain-splits produce chain split coins.  

Examples of hard forks resulting in chain-splits and chain-split coins  The two most well-known chain-splits and therefore chain-split coins are:  

– Ethereum (ETH) and Ethereum Classic (ETC) on 7-2-16 (1 ETH: 1 ETC)  – Bitcoin (BTC) and Bitcoin Cash (BCH) on 8-1-17 (1 BTC: 1 BCH)  

The DAO hack and Two Ethereum

The DAO was a decentralized investment fund of sorts built with Ethereum; however, a hacker drained $50MM in June 2016 from a record-setting $150MM ICO at the time. 6The Ethereum community chose to roll back the blockchain via hard fork to “reverse the theft” and get the ETH  back. A small group of dissenting miners was steadfast in believing “Code is Law” and blockchain immutability shouldn’t be compromised at any cost. 7The minority miners continued mining the original chain, Ethereum, with native token ETH, which “branched” into Ethereum Classic with native token ETC effectuating the chain-split on July 20, 2016. Every ETH token holder who controlled their private keys before the split is entitled to the same number of tokens on the new chain. Chain-split coins always exist on a 1:1 basis. 8 Coin Center explains it like this, “A better term for a blockchain fork that leads to two divergent cryptocurrencies would be a contentious fork…In a contentious fork, both networks recognize these pre-fork balances as valid; so, in that sense, a user of the pre-fork chain will, by no action of her own, “have” tokens on both networks post-split. 9

Dominion and control of chain-split coins 

Chain-split coins are at the center of whether or not someone manifests dominion and control. The  chain-split coins are like conjoined twins requiring “technical surgery” in some cases to split the coins into two separate coins. This technical splitting is exercising dominion and control and always involves action on behalf of the token holder. The token holder does not have possession of the new coins outright upon the chain-split, and possession and acceptance happen simultaneously when and if they successfully split their coins.  

Risks of “acquiring chain-split coins”  

Coin-splitting always involves a high degree of coin-split risk comprised of six main vectors, and  many of the risks are interrelated.  

  • Security risk
  • Privacy risk
  • New software risk 
  • Fraud risk 
  • Casualty risk 
  • Replay risk  

Splitting coins requires a high degree of preparation and a series of carefully executed steps to mitigate coin-split risk. Pre-chain-split coins are akin to identical conjoined twins sharing the same  DNA except with bitcoin; it means sharing the same private keys or mnemonic seeds and addresses.

  

Security and privacy  

If crypto security is compromised, it could lead to theft. Generally, token holders should sweep their BTC, for example, to a new address or wallet. Otherwise, the “shared DNA” could reveal all previous transaction history of the pre-split bitcoin and connect it to new chain split coins, BCH  for example. Additionally, both the public key and private key could be compromised, resulting in a loss of funds in the worst case. Bitcoin Magazine stated, “The bad news is that it’s not necessarily easy or safe to claim your BCH straight away. If you are not careful, you may accidentally expose your private keys while claiming your BCH. And because these are the same  private keys that secure your BTC, this could lead to your BTC being stolen.” 10

Replay Vulnerability  

The same thing that happens on one chain, post-split, can also occur on the other chain without special replay protection. Replay vulnerabilities can be malicious (replay attack) or inadvertent.  Circle describes what can happen when reply protection is not available, “This confusion can lead  to token holders unintentionally sending transactions on one of the new chains, resulting in a loss  of funds.”11 Bitcoin Cash, for example, built replay protection into the protocol, and some splitting tools also include a method for reply protection. Nonetheless, someone could  successfully split coins and still be subject to reply attacks years down the line if they did NOT  incorporate reply protection during the splitting process.12

New software risk & Fraud risk  

Wallets, exchanges, miners, and nodes have to upgrade and/or create new software compatible with the new chain. Developers may or may not be proactive, depending on how much they anticipate the chain-split. Most upgrades tend to happen rapidly, post-split, introducing significant bugs. Meanwhile, nefarious actors swoop in to steal coins offering the most “user-friendly”  splitting tool, which sends users’ coins to the hacker’s address. Bitcoin Magazine describes the new software risk like this, “It is all very new, developed within a short timeframe, and the peer review done on all this software has probably not been as extensive as it usually is within the Bitcoin space. It is therefore probably wise not to import your private keys in such software right  away; instead, wait to see if there are any reports of problems.”13

Casualty Risk  

The loss of funds is a “casualty or theft loss” in the context of taxation. A casualty loss comes from making user mistakes, not following directions, or from a wallet bug (new software risk). Theft is essentially fraud risk and a subcategory of casualty losses.  

Steps for “acquiring chain-split coins” (and manifesting dominion and control)  

Step 1: Identify wallets with pre-split coins

The specific wallets holding pre-split coins can determine the approach for splitting the coins. If coins are in three different wallets, it could magnify the effort three-fold by requiring three different methods. For example, Alice had BTC in a paper wallet, hardware, a desktop wallet, and an exchange. Alice can’t do anything with her BTC on the exchange because she doesn’t control the private keys. Remember the “not your keys, not your coins” mantra.  

Step 2: Research trusted resources  

Alice does extensive research reading chain-split articles on trusted news sites and specifically the websites for her particular wallets. For example, she has a Trezor hardware wallet and visits their site, hoping to find a BTC~BCH chain split guide. She continues to monitor new publications for additional information.  

Step 3: Assess the Risk  

Alice has to navigate and consider all the risks mentioned above of acquiring chain-split coins.  Fortunately, she is pretty crypto savvy, yet feels overwhelmed with all the content from her extensive research. The risk is exceptionally high right after the chain-split. It goes down over time as users and developers identify bugs, scams get exposed, split wallets develop split guides, and services improve.  

The risk assessment is a cost-benefit exercise, and the risk of losing BTC, compromising privacy,  or getting scammed can be far higher than the value of acquiring BCH. Bob only has 3.3 BTC, and therefore his upside is the potential value of 3.3 BCH when he acquires it. Alice, on the other hand,  has 1,178 BTC, so she is more motivated to navigate the risk to get her 1,178 BCH, which at one point could have been worth millions of dollars. Bob chooses not to split now because the risk is too high, but he can always do so at another time. Alice sees dollar signs and elects to go for it.  

Step 4: Choose the splitting method  

Alice has to use three different chain-splitting ways for each of her three wallets. She’s using guides for each wallet, including additional steps to follow for best practices as a result of her preliminary research. She’s not confident about splitting her paper wallet BTC, so she’s going to defer splitting those coins until a later time. See below for more information on the types of splitting methods.

 

Step 5: Prepare to split: Move pre-split coins  

Alice needs to import her BTC private keys into the new BCH version of her desktop wallet.  Importing keys is one way to acquire coins because BTC and BCH both share the same DNA. She knows the software could be buggy, and she doesn’t fully trust the wallet developers. Alice sweeps her BTC from the original pre-split wallet to a new wallet with a fresh set of private keys. She imports the original private keys into the new BCH wallet, thereby thwarting any attempts by nefarious wallet developers who could steal private keys. Those bad actors can’t steal Alice’s BTC  using her original private keys because the BTC resides in a new wallet with new keys. Sweeping coins to a new address may or may not add reply protection depending on the wallet and the method in Step 4.  

Step 6: Consider replay protection  

During her research in Step 2, Alice discovered her desktop wallet provides reply protection within the coin-splitting feature. In this case, she doesn’t have to take additional steps for reply protection.  Bitcoin Cash has reply protection at the protocol level while Bitcoin SV (another chain split from  BCH) does not.  

Edge wallet states, “Included in the split function is some home-brewed replay protection.  Replay protection was not added at the protocol level of the BCH-BSV chain-split but we were  able to implement replay protection for Edge users which prevents funds from one chain from  being spent on another.” 14

Wallets or other services may or may not provide replay protection; therefore, users may have to create their own. For example, Alice sends some BTC dust (a very tiny amount of BTC) to the old  BTC address before sweeping her BTC to a new wallet as she did in Step 5. The dust essentially taints the original coins so they can’t be spent on the new chain. Splitting tools also use dust to  separate the coins, as explained by Bitcoin.com, “When this small amount of dust is mixed with  the original BCH funds the coins will automatically split into two.” 15

Step 7: Follow the guides & split the coins  

Now that Alice has completed her due diligence, research, risk assessment, and pre-split preparation, she’s ready for the next steps to split the coins. She follows the guide step-by-step,  creates a new wallet and related addresses for BCH as necessary, sends a BTC transaction, and receives the pre-split BTC back. She also receives BCH in the same wallet or a new BCH wallet,  depending on the situation. See below for more information on the types of splitting methods.  

Step 8: Document the process  

Alice verifies the BTC and the BCH on respective block explorers and saves the transaction IDs for both transactions from both chains. Alice acquires the new coin, and dominion and control manifest at this point. She takes screenshots and detailed notes to document the entire splitting process from beginning to end for tax purposes and as an internal reference guide. Excellent documentation can be used for future chain-splits and makes the process much easier the second time around.  

Types of coin-splitting methods  

Exchange splitting services  

Crypto exchanges provide splitting services as a convenience to their customers. Alice could have sent BTC to an exchange which splits the tokens without any additional effort by the customer.  The service is a fast and easy method; however, it compromises privacy because exchange addresses are generally known, and it requires trusting a third party with the funds. 16

Crypto held on exchanges  

This exchange splitting service should not be confused with BTC held on an exchange before a  chain-split. As mentioned, the customer does not control keys in this case, and an exchange may or may not credit chain split coins to a customer’s account based on the exchange’s discretion and their terms and conditions. A customer would have dominion and control if and when the exchange credits the customers’ exchange account with the new tokens.  

Wallets with splitting features  

Wallets upgrade to provide coins splitting functions while publishing-related coin-splitting guides,  which may allow users to separate their BCH and BTC within the same wallet. Guides are  published be hardware wallets, desktop wallets, and others.17

Spitting services  

Third-party splitting services provide a tool for splitting coins independent of wallets or centralized exchanges. Shapeshift, a non-custodial exchange created a splitting tool for ETH and ETC.18

Importing private keys (do-it-yourself) splits  

Alice took the DIY approach in Step 5 by sweeping her BTC into a new wallet in preparation for importing her old BTC private keys into her new BCH wallet. This method involves more skill and has more risk, especially when contrasted with exchange splitting services.  

Smart contract splits  

Most of the examples highlighted BTC and BCH, but the same principles can apply to other chain splits. Ethereum is a smart contract platform; therefore, token holders can split ETH and ETC coins using a smart contract, which introduces another degree of risk and complexity. For example, Alice sends her ETH to the smart contract which sends back the original ETH and sends the ETC to a  new ETC wallet Alice created.  

ETH~ETC Case study  

How much work is it? How long does it take? This smart contract split sounds simple; however,  in one case study splitting ETH and ETC took several days and more than 14 hours. The investor’s time included considering the chain-split risk of acquiring the coins, all the steps for acquiring the coins, including best practices for documentation, the various methods for splitting the coins,  setting up new wallets and addresses, and consultation with a highly reputable developer in the space. The coin split didn’t take place until two years after the ETH~ETC chain split. 19

A metaphor for claiming chain split coins  

Money does grow on trees, and in the case of chain-split coins, it grows on trees inside a barbed wire fence secured by dogs and armed guards. It’s your tree and your money, and you can see the  money on the tree from outside the fence. You have to choose whether retrieving the money  (picking those apples and oranges from the tree) is worth the risk.  

Conclusion: D&C of chain-split coins  

Coin-splitting can be easier in some cases rather than others, and there’s substantial risk in choosing to split coins. There can be significant work during the research and due diligence phase before determining whether or not to proceed with a coin-split. The actual preparation and coin-spitting process can also take considerable time depending on the skill level, confidence, and experience of the token holder. Acquiring chain-split coins requires extreme effort, and the point when dominion control manifests is particular and verifiable on respective blockchains with a  timestamped transaction ID. Dominion and control never happen at the point when a chain-split occurs; instead, it can only happen at a later point in time if and when a token holder completes the coin-split.  

Airdrops  

An airdrop is a cryptocurrency distribution based on existing token holdings or addresses, sometimes without the token holder’s knowledge, to bootstrap a new blockchain. There are many different kinds of airdrops, making it difficult to define the term. In most cases, there is little to no risk or action required to get free tokens. A token holder can have “possession” of a new airdropped token without knowing it. A few examples of definitions help explain the concept of an airdrop.  

Three examples of airdrop definitions:  

  1. “What are crypto airdrops? Funny enough, this isn’t as easy to explain as it looks…A  cryptocurrency airdrop is a free coin giveaway in the blockchain industry.”  “Personally, I find the easiest comparison in the real world to be freebies you receive on the street…That’s a free sample, that’s an airdrop!” 20
  2. “Cryptocurrency airdrops are basically free coins that are dropped directly into your wallet.  It is literally free money handed over to you!” 21
  3. “In the cryptocurrency and blockchain ecosystem, the term “Airdrop” refers to the  distribution of digital assets to the public, either by virtue of holding a certain other token  or simply by virtue of being an active wallet address on a particular blockchain.”22

Exchange “exclusion” 

Tokens holders must control the private keys for a given wallet to receive airdropped tokens.  Exchange customers do not control their own private keys however, exchanges may or may not credit their customers with airdrops (or chain-split coins) depending on technological complexity, existing terms and conditions and other considerations. Exchanges are trending towards crediting customers with airdrops because of increased competition and the desire to retain loyal customers.  Tokens held on exchanges will not be included in a snapshot or any other airdrop method because the token holder does not control the private keys. 

Types of airdrops  

Airdrops are typically promotional in nature, so the project team can design an airdrop in any creative way to get the most awareness. Any particular airdrop could have its nuances; however,  it’s essential to examine the fundamentals to distinguish when a taxpayer “acquires the ability” to transfer, sell, exchange, or otherwise dispose of the airdropped cryptocurrency to determine when dominion and control manifests.  

Two main types of airdrops (snapshot & giveaways)  

Airdrops fall into two main buckets, snapshots, and giveaways. A snapshot is a particular type of airdrop, and all other airdrops are mostly giveaways or a “catch-all” category for everything else.

  

Giveaways  

Giveaways fall into three subcategories, standard, bounty, or exclusive. The typical standard giveaway requires someone to supply name, email, and crypto address for receiving tokens or simply the most basic information needed to give tokens away. The typical bounty is like the standard giveaway, but it requires additional “user actions” to qualify for the token giveaway. For example, the prospective token holder has to join a Telegram channel, a Facebook group, and make a tweet or Facebook post promoting the project. The exclusive giveaway could be like the standard or bounty, except the airdrop is “exclusive” only to a certain group of people based on loyalty or some other metric. 23 

Examples of giveaways:  

Polymath, a security token platform, initiated a 10MM token giveaway in total and 250 POLY  tokens for each registered user to promote the platform. Users had to sign up, complete a KYC  check, and include and ETH address to get POLY tokens. The user acquired the ability to access the coins by successfully registering on the platform.  

“Only users who signed-up for the Airdrop at polymath. network prior to January 10th are eligible to receive the free POLY tokens. Due to the above legal requirements, you must also comply with  the terms and conditions and verify your identity through our KYC portal at  token.polymath.network” 24

Stellar created an XLM token giveaway token in partnership with Keybase, an encrypted messaging app over a 20-month period to simulate adoption on both platforms. Keybase users needed an active account before the monthly airdrop to claim a portion of that month’s token rewards. Keybase users can claim free XLM when they open the messaging app. The taxpayer has to generate keys to a new wallet within Keybase to claim the XLM. The taxpayer exercises  dominion and control upon generating the keys, which can be verified by a transaction ID. 25

Acquiring giveaway airdrop tokens  

Prospective token holders always take action, such as supplying an email, providing a crypto  address, or tweeting as a precursor to receiving tokens; therefore, they complete the work to  acquire the tokens BEFORE the tokens are “airdropped.” The prospective token holder actively participates prior the actual airdrop and they are always aware of the airdrop before and after it happens because of their active participation. This is contrary to the way snapshots work as explained below.  

Next, the new blockchain has to launch and actually distribute the tokens as promised. If the project never distributes tokens, then there is nothing else to consider because no tokens were acquired.  The token holder already established control as explained above and, therefore, if the airdrop takes  place, they can immediately transfer, sell, exchange, or otherwise dispose of the tokens. Dominion and control manifest at the time of the airdrop, which should be verifiable by a transaction hash.  

Snapshots  

A snapshot of an existing blockchain and related address balances at a point in time (time 0), is  typically used to make a pro rata distribution of new tokens at a later point in time (time 1). A  snapshot is a blockchain state at a given time, which is like taking a picture of the blockchain.  

There are two main types of snapshots, token standard airdrops, and codebase forking airdrops.  Project teams can easily create tokens with token standards and distributed on top of an existing blockchain. Developers use codebase forking to create a new blockchain, and the native tokens of  the new blockchain are distributed based on the snapshot of another blockchain.

Token standards  

Most airdrops happen on Ethereum because the ERC-20 standard tokens are easy to create on the existing network. Newly created ERC-20 tokens are automatically compatible with Ethereum wallets, which means new wallet software isn’t needed. The airdrop could also be done based on the number of active addresses rather than pro rata. Other blockchains such as NEO and Tron have token standards, NEP-5 and TRC10/20, respectively, similar to Ethereum.  

Example of token standard airdrop  

OmiseGo was one of the original ERC-20 token airdrops on Ethereum. Anyone holding ETH  before the snapshot would receive a pro rata share of OMG tokens. ETH must be kept in an  Ethereum wallet such as My Ether Wallet in which the user owns and controls the private keys.  Therefore, ERC-20 token airdrops can happen WITHOUT the token holder’s knowledge.  

OmiseGo’s airdrop announcement states, “In OMG’s case, 5% has already been set aside from the  total issuance, ready to be distributed by an automatic airdrop. That is, sometime quite soon (TBA  soon), every address on the Ethereum blockchain that held a balance over a minimum threshold of  0.1 ETH at a recent past block height (TBA soon) will receive a share of this 5% that is  proportionate to their share of ETH.” 26

Acquiring token standard airdrops  

Prospective tokens holders do work to acquire the tokens AFTER the tokens are “airdropped.” The prospective token holder passively participates before the actual airdrop. The only prerequisite to getting XYZ tokens is having ABC tokens or an ABC token address. Most of the time, tokens holders already have ABC tokens, and the possibility of getting XYZ tokens is a bonus; however,  someone can rush out and buy ABC tokens and set up a wallet in anticipated of the airdrop. Token holders may or may NOT know about the airdrop before or after it happens.  

Tokens airdropped using the token standard method are using smart contracts for the distribution.  Even though the new tokens are compatible with existing wallets, the tokens don’t magically  appear in a wallet. My Ether Wallet will not show OMG tokens, for example, unless the token  holder clicks the “add custom token” feature for a particular coin. Meanwhile, an ETH address  search on Etherscan, an ETH block explorer, will show an OMG transaction on the ERC-20 token  tab for that address. If a token holder goes back to their ETH wallet, clicks “custom token” and  adds the smart contract address, token symbol, and decimal places, the token balance will appear  in their wallet. 27  

Free samples analogy  

Token standard airdrops are akin to getting unsolicited property, free book samples, or soap  samples in your mailbox, except in the case of crypto, the user may have NO idea the OMG airdrop  existed. At the time of the airdrop, the user can transfer, sell, exchange, or otherwise dispose of  the tokens. Most of the time, the tokens are worthless, and there is no active trading market. The  user has possession but hasn’t necessarily accepted the coins as her own, therefore acceptance  could be selling the tokens at a later time when they have value. An OMG token sale could reflect acceptance and exercising dominion and control. “The dominion and control doctrine applies to  rights and property received, but not paid for, by a taxpayer, including unsolicited property such  as free samples and security purchase rights,” explains Jim Calvin, Global Tax Leader, Deloitte,  and further, “A sale of rights, as in Rev. Rul. 63–225, is not the only method of exercising dominion  and control; however, by selling the taxpayer made it plainly evident that he was able to, and, in  fact, did exercise dominion and control…” 28 

Codebase “forking” airdrops  

The concept of taking a blockchain snapshot is the same for token standard airdrops and codebase  forking airdrops. This part of the process defines who gets tokens and how many. The similarities  stop there as the distribution method is what makes each of these methods different.  

Developers use “codebase forking” to modify the codebase of an existing blockchain, which is  usually the same blockchain used for the snapshot. The new blockchain team distributes tokens on  a new blockchain based on the snapshot of a preexisting blockchain. The new blockchain could be  developed using an entirely new code, but the DNA of the new blockchain is usually related to the  old blockchain. The private keys for tokens on the pre-existing blockchain are the gateway to  accessing the airdropped tokens on the new blockchain which should not be confused with  accessing chain-split coins. Codebase forking means creating a brand new blockchain rather than  a hard fork resulting in a chain-split with two branches sharing a common trunk.  

Example of a codebase forking airdrop  

The NXT blockchain has been around since 2014. Ardor, a new blockchain built on NXT  technology, launched introducing the concept of child transaction chains that rely on the parent  chain, Ardor, for security. IGNIS was also the first child chain of Ardor. A NXT snapshot created  the opportunity for NXT token holders to claim both IGNIS and ARDR tokens based on different methodologies.  

Ardor states, “The Ardor Genesis Snapshot was taken at block height 1636363 on the Nxt  blockchain. The Ardor Blockchain Platform launched as planned, on January 1, 2018. All NXT  holders…will find their ARDOR and IGNIS tokens on the Ardor blockchain, accessible using the  same account number and password as for the Nxt blockchain.” Ardor goes on to explain how  ARDR tokens were distributed, “As a reminder, ARDR tokens on the Nxt blockchain were  allocated to NXT holders based on their average NXT balances during a three month period in  2016,”29 and nxter.org explains the IGNIS airdrop, “Your NXT balance @ the snapshot block  determines how much IGNIS you will get: 1 IGNIS per 2 NXT.”30

Acquiring codebase forking airdrops  

Claiming these airdrops is substantially different from token standard airdrops. Acquiring the  ability to transfer, sell, exchange, or otherwise dispose of these tokens is similar to some methods for acquiring chain-split coins. Bitcoin (BTC) and Bitcoin Cash (BCH) share the same DNA after  the chain-split, and BTC private keys enable the token holder to “acquire” BCH by importing those  same keys into a new Bitcoin Cash wallet. Token holders can use the same method to claim ARDR  and IGNIS tokens described above. For example, a user needs to download the new ARDR wallet  and import the private key to access the new tokens. When a user imports private keys, it does not  produce a transaction ID similar to the way splitting coins provides a transaction(s) to complete  the spitting process. In some ways, this also has similarities to adding a custom OMG token in the  ETH wallet example and the distribution of token standard airdrops. Therefore, acquiring the  ability and manifesting dominion and control could come from the act of successfully importing  keys or arguably selling the tokens as referenced the OMG example.  

Conclusion: D&C of airdrops  

The dominion and control of airdrops depend on the type of airdrop. Prospective token holders  always engage in some kind of active participation to qualify for giveaways; therefore, they have  “acquired” the ability to transfer, sell, exchange, or otherwise dispose of the tokens before the  giveaway completes. There are two kinds of snapshot airdrops, “token standards” and “codebase  forking,” and dominion and control look entirely different for both of these. For example, ETH  tokens like OMG are akin to free samples where dominion and control are not always clear but  can manifest upon the sale of the items. Dominion and control of ARDR tokens, on the other hand,  could be similar to ETH token example, but could potentially take place upon successfully  importing private keys into the new wallet. 


1 “Virtual Currency FAQs .” IRS, Oct. 2019, www.irs.gov/individuals/international-taxpayers/frequently askedquestions-on-virtual-currency-transactions.

2 “Rev. Rul. 2019-24.” IRS, Oct. 2019, www.irs.gov/pub/irs-drop/rr-19-24.pdf.  

3 “Comments on Revenue Ruling 2019-24, the New Question on Schedule 1 (Form 1040), and the Internal Revenue Service’s Frequently Asked Questions on Virtual Currency Transactions .” AICPA, 28 Feb. 2020,  www.aicpa.org/content/dam/aicpa/advocacy/tax/downloadabledocuments/20200228-aicpa-letter-on irsvirtual-currency-guidance.pdf.  

4 Van Valkenburgh, Peter. “What Are Cryptocurrency Forks, Airdrops, and What’s the Difference?” Coin Center,  17 Oct. 2019.  

5 “Comments on Revenue Ruling 2019-24, the New Question on Schedule 1 (Form 1040), and the Internal Revenue  Service’s Frequently Asked Questions on Virtual Currency Transactions .” AICPA, 28 Feb. 2020,  www.aicpa.org/content/dam/aicpa/advocacy/tax/downloadabledocuments/20200228-aicpa-letter-on irsvirtual-currency-guidance.pdf.

6 Finley, Klint. “A $50 Million Hack Just Showed That the DAO Was All Too Human.” Wired, 18 June 2016,  www.wired.com/2016/06/50-million-hack-just-showed-dao-human/. 

7 Avricco. “Code Is Law and the Quest for Justice September 8, 2016.” Ethereum Classic Blog, 8 Sept. 2016,  ethereumclassic.org/blog/2016-09-09-code-is-law/.  

8 Hertig, Alyssa. “Ethereum’s Two Ethereums Explained.” Coindesk, 28 July 2016,  www.coindesk.com/ethereumclassic-explained-blockchain.  

9 Van Valkenburgh, Peter. “What Are Cryptocurrency Forks, Airdrops, and What’s the Difference?” Coin Center,  17 Oct. 2019. 

10 Van, Aaron. “A Beginner’s Guide To Claiming Your ‘Bitcoin Cash’ (And Selling It) .” Bitcoin Magazine, 1 Aug.  2017, bitcoinmagazine.com/articles/beginners-guide-claiming-your-bitcoin-cash-and-selling-it.  

11 “Preventing Replay Attacks after the BCH Hard Fork .” Circle , 7 Dec. 2018,  blog.circle.com/2018/12/07/preventing-replay-attacks-after-the-bch-hard-fork.  

12 “What Is a Replay Attack? .” Exodus , support.exodus.io/article/168-what-is-a-replay-attack.

13 Van, Aaron. “A Beginner’s Guide To Claiming Your ‘Bitcoin Cash’ (And Selling It) .” Bitcoin Magazine, 1 Aug.  2017, bitcoinmagazine.com/articles/beginners-guide-claiming-your-bitcoin-cash-and-selling-it. 

14 Muser, Brett. “How to Claim Your BSV With Replay Protection.” Edge, 29 Nov. 2018,  https://edge.app/blog/how-to-claim-your-bsv-with-replay-protection/.  

15 Redman, Jamie. “Follow This Branch: A Guide to Splitting BCH and BSV.” Bitcoin.com, 24 Nov. 2018,  news.bitcoin.com/follow-this-branch-a-guide-to-splitting-bch-and-bsv/. 

16 “Easiest Way to Split Your Bitcoin Cash Forked Coins (BCH & BSV).” Medium, 2 Dec. 2018,  medium.com/@normal_rc/easiest-ways-to-split-your-bitcoin-cash-forked-coins-bch-bsv-7e545d046b31.  

17 “Managing the ‘Bitcoin Cash’ Fork.” Ledger, 31 July 2017, www.ledger.com/managing-the-bitcoin-cash-fork/.  

18 Jindal, Aayush. “Shapeshift Ethereum Splitter Makes Splitting ETH&ETC a Cakewalk.” NewsBTC.com, 5 Aug.  2016, www.newsbtc.com/2016/08/05/ethereum-classic-price-technical-analysis-etc-hesitates-may-recover/. 

19 “Client Case Study of ETH and ETC Coin Split.” Global Crypto Advisors, 2018.  

20 Christensen, Morten. Airdrop Alert, 2019, blogs.airdropalert.com/what-are-crypto-airdrops-free-coins/. 

21 Mitra, Rajarshi. “Learn What Are Airdrops? 5 Benefits of Free Tokens – Ultimate Guide .” Blockgeeks, 2019,  blockgeeks.com/guides/what-are-airdrops/.  

22 “Airdrop.” Binance , 2020, www.binance.vision/glossary/airdrop.  

23 Mitra, Rajarshi. “Learn What Are Airdrops? 5 Benefits of Free Tokens – Ultimate Guide .” Blockgeeks, 2019,  blockgeeks.com/guides/what-are-airdrops/. 

24 “Polymath Token Airdrop FAQ .” Polymath, 16 Jan. 2018, blog.polymath.network/polymath-token-poly airdropfaq-d4c268df511b .  

25 Dale, Bradley. “Stellar Tried to Give Away 2B XLM Tokens on Keybase. Then the Spammers Came .” 13 Dec.  2019, www.coindesk.com/stellar-tried-to-give-away-2b-xlm-tokens-on-keybase-then-the-spammers-came.

26 “OmiseGO: Airdrop Update .” Omise, 7 Aug. 2017, www.omise.co/omisego-airdrop-update. 

27 “Client Case MEW Wallet OMG ERC-20 Token Consulting.” Global Crypto Advisors, 2018. 

28 Calvin, Jim. “When (and If) Income Is Realized from Bitcoin Chain-Splits.” Deloitte, 2017,  www2.deloitte.com/content/dam/Deloitte/us/Documents/financial-services/us-fsi-tax-bitcoin-chain.pdf.  

29 “Ardor Platform Launch .” Ardor, 1 Jan. 2018, www.jelurida.com/ico. 

30 Apenzi. “What Is Going On?” Nexter.org, 18 Dec. 2018, www.nxter.org/ignis-airdrop/.

Share this

Legal Disclaimer
This content is provided for informational purposes only and in no event shall be construed as the rendering of professional advice or services. As such, the information provided in this content should not be used as a substitute for consultation with professional advisors. By reading this content, you expressly agree that any opinions, valuations, quotes, statistical, quantitative and other information contained in this content is, and will be construed solely as, statements of opinion and not statements of fact. No representations or warranties, express or implied are given in, or in respect of, this content. All information in this content is provided “AS IS,” with no guarantee of completeness, accuracy, and timeliness or of the results obtained from the use of this information. To the fullest extent permitted by law, in no circumstances will Lukka, any of its related entities, or the owners, agents, officers, directors or employees thereof be responsible or liable to you or anyone else for any decision made or action taken in reliance on the information contained in this content.

Recommended for you

Speak with one of our data experts and unlock the full potential of your crypto business.