10.02.2016 Views

Bitcoin and Cryptocurrency Technologies

1Qqc4BN

1Qqc4BN

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

The challenge of real‐world security<br />

Defending against any form of theft — cars, art, money, etc. — is an exercise of prevention, detection<br />

<strong>and</strong> correction. Preventive security mechanisms try to stop theft before it happens, while detection<br />

mechanisms ensure theft is perceived so potential corrective measures can be taken to revert the<br />

damages of the theft <strong>and</strong> to punish the perpetrator (which could also serve as a deterrent to<br />

committing theft). Car locks <strong>and</strong> alarms are preventive mechanisms, while GPS tracing units (such as<br />

LoJack) can assist in detecting the theft <strong>and</strong> enabling law enforcement to recover the stolen car. The<br />

key insight is the car lock is just one small piece of deterrence to car theft — one piece of a large,<br />

intricate system involving police, insurance companies, courts, etc. If you lived in a lawless<br />

environment, a car lock by itself wouldn’t be much of a deterrent to theft. Leaving your car locked on<br />

the street would ensure that it would be quickly stolen.<br />

The model we have seen for smart property relies heavily on preventive mechanisms. We were able<br />

to achieve decentralization only because we equated possession with ownership — owning a car is<br />

essentially equivalent to knowing the private key corresponding to a designated transaction on a<br />

block chain. But this control mechanism is a poor replacement for our current mosaic of institutional<br />

support, as we’ll explain.<br />

If we reduce ownership to the problem of securing private keys, it raises the stakes for digital security,<br />

which is a difficult problem with humans being a weak link. Programmers have endeavored to write<br />

bug‐free code for decades, but the challenge remains elusive. Designers of cryptosystems have tried<br />

for decades to get non‐technical users to utilize <strong>and</strong> manage private keys in a way that resists both<br />

theft <strong>and</strong> accidental loss of keys, also with little progress. If the model of decentralization relies<br />

excessively on private keys, cars might get stolen by malware or in phishing attacks, <strong>and</strong> the loss of a<br />

key might turn your car into a giant brick. While there could be fallback mechanisms to cover these<br />

types of events, inevitably such mechanisms tend to lead us back toward intermediaries <strong>and</strong><br />

centralized systems, chipping away at the benefits of the decentralized model that we were striving<br />

for.<br />

Another area of property transfers that is fundamentally human‐oriented is dealing with disputes that<br />

might arise over the terms of sale or other aspects of the transfer. If the real world, if the participants<br />

cannot reach a resolution, the issue will end up in court where a judge will methodically examine each<br />

bit of evidence, testimony, <strong>and</strong> written words to reach a nuanced ruling about the validity of the sale.<br />

It is tempting, particularly for technical people, to think of the law as a set of logical rules or<br />

algorithms that can produce a clear‐cut ruling. However the reality of the legal system is that not only<br />

are laws <strong>and</strong> contracts verbose, they are ultimately subject to human interpretation <strong>and</strong> discretion,<br />

which is further removed from the notion of clear‐cut logical rules. This is not a weakness. It allows<br />

resolving situations that are far more complex than what was anticipated by the individuals writing<br />

the law.<br />

304

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!