Created
February 5, 2018 03:38
-
-
Save automaticgiant/3c56b8c062401ed39f198fcad85a9ce0 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
1 | |
Michael Culhane's Blog: Authentic | |
Blockchains and Bogus Blockchains | |
Posted by Michael Culhane Jan 3, 2018 | |
Introduction | |
Sandeep Sood posted, “Fake it ‘til they break us: the dangerous distraction of permissioned | |
blockchains” a few months ago. Reflecting on his insights and doing some further reading | |
on his subject, prompted me to write this post. I want to reinforce and elaborate on the | |
important distinction Sandeep drew between blockchains and “permissioned blockchains.” | |
The Relevance of the Past to the Present | |
The Social Democrats’ Second Party Congress in Russia in 1903 occurred fourteen years | |
before the revolution that overthrew tsarism. Two factions were vying for control of the | |
revolutionary movement. Lenin headed one of them, but his group constituted a minority | |
at the Congress. Taking advantage of disarray within his opponents’ camp, however, he | |
shrewdly labeled his own minority group the “Bolsheviks” (literally the “Majoritarians,”) | |
and dubbed his opponents, who outnumbered his side, the “Mensheviks” (literally the | |
“Minoritarians,”). | |
Lenin’s bold stroke worked because both labels stuck and played a major role in altering the | |
course of history, to the detriment of the Russian people and many of their neighbors. His | |
brilliant public relations maneuver anticipated the creation, a few decades later, of the PR | |
industry. The main issue at the Second Party Congress that provoked such a fierce fight was | |
centralization versus democratization. Sound familiar? | |
The Current State of Affairs | |
Permission-less blockchains can be genuine. “Permissioned blockchains” cannot. The | |
difference between them is that simple. Some of the proponents of “permissioned | |
blockchains” have appropriated the term “blockchain” in order to co-opt Satoshi Nakamoto’s | |
ideas, with the aim of using diluted versions of them to prop up and maintain the existing | |
order of monetary systems that authentic blockchains threaten not merely to reform, but to | |
disrupt on a massive scale. | |
Michael Culhane's Blog: Authentic Blockchains and Bogus Blockchains | |
2 | |
The crucially important issue of who originates the critical terms pertaining to the rapidly | |
heating up monetary debate must be addressed. Whoever controls language controls the | |
dialogue. To define a “blockchain” as a shared ledger or a transparent database is to use | |
that term promiscuously. Shared ledgers and transparent databases that fail to incorporate | |
a blockchain’s most essential attribute (which I will delineate below), are nothing but bogus | |
blockchains. The same type of obfuscation occurs when the word “cryptocurrency” is used | |
interchangeably with the terms “digital currency” and “virtual currency.” Even if no one | |
is practicing deception, these misnomers can only sow confusion in the marketplace of | |
contending ideas relevant not only to currencies, but also to full-fledged monetary systems. | |
In this important discussion, we must relentlessly challenge intellectual laziness, which has | |
already begun to degenerate into Orwellian doublethink. (See Sandeep’s post in which he | |
exposes the Bank of America CEO’s inaccurate statements. The internet is teeming with | |
other examples.) | |
Fortunately, the leading members of the existing monetary order do not constitute a | |
monolithic bloc. Some are forward-looking, while others are desperately clinging to | |
obsolescent financial functions and controls. The former will continue to enable consumers | |
to benefit from forthcoming innovations. The backward-looking thinkers’ responses to the | |
challenges revolutionary cryptocurrencies have posed to the existing order have generated | |
systematic semantic confusion. | |
Certain troglodytes within the financial establishment, such as JP Morgan Chase’s CEO Jamie | |
Dimon, are willing to mislead the public in order to preserve what they have: centralized | |
control over their niches within monetary systems that are ultimately controlled by sovereign | |
states. But it is time to hold him and his ilk accountable for perverting language with the | |
goal of preserving their positions of power within systems whose salient characteristic is | |
centralized control. | |
Strong, unequivocally stated views about cryptocurrencies’ virtues or flaws foster fruitful | |
discussions. But imprecise language hinders lucidity, a prerequisite to understanding various | |
currencies’ advantages and disadvantages (including those of fiat currencies). | |
Whenever I use the term “blockchain” in this post, I am referring only to authentic | |
blockchains, which I will describe below. I believe I have solid etymological grounds for doing | |
so. The first use of the word “blockchain” I am aware of occurred in 1976 when four computer | |
scientists, Ehrsam, Meyer, Smith and Tuchman, introduced a process known as “Cipher Block | |
Michael Culhane's Blog: Authentic Blockchains and Bogus Blockchains | |
3 | |
Chaining” (CBC). CBC is a process used in encryption algorithms, but it is not relevant to | |
Proof of Work (PoW) or shared ledgers. Starting in 1997, the term “block chain” was used in | |
discussions about “HashCash,” which is a PoW function. In his seminal white paper published | |
in 2008, Satoshi repeatedly used the words “block” and “chain,” but he never linked them | |
together. Shortly thereafter, Hal Finney, in an exchange with Satoshi, first used the term | |
“block chain” to denote Bitcoin’s ledger. (The preceding four sentences are based on this | |
post.) | |
Satoshi designed Bitcoin’s ledger specifically to embody PoW, using HashCash. Finney’s was | |
the first use of the term “block chain” to denote a shared ledger, and most uses of the term | |
“blockchain” today (correct or incorrect) stem from Satoshi and Finney’s attaching to it a new | |
meaning. Since then, writers have consolidated the term into a single word, “blockchain,” and | |
have used either an upper-case “B” or a lower-case “b,” when employing that term, depending | |
on the context and the writers’ preferences. (This and the preceding paragraph are based on | |
a perusal of the etymological record. I welcome corrections, clarifications, or elaborations.) | |
Authentic Blockchains | |
Satoshi did not first conceive of a blockchain and then try to figure out what could be built on | |
it. Instead, he sought to create a true peer-to-peer electronic cash system and decided that | |
he needed a blockchain to provide its foundation. A blockchain enables the participants in | |
a distributed network to reach a consensus on their own, rather than to trust a centralized | |
authority to impose one on them. | |
Blockchains as record-keeping structures are computationally redundant and, therefore, | |
cumbersome as well as relatively expensive. Bitcoin is a justifiable application of blockchain, | |
even though blockchain is undesirable for many reasons. If Bitcoin can rid itself of its | |
burdensome blockchain, while preserving its integrity, it still will be Bitcoin. | |
Blockchain’s single revolutionary attribute is: finality of information secured by proof of work. | |
What I refer to as “bogus blockchains” fail to incorporate PoW. | |
Proof of Work | |
A particular PoW is a string of symbols that, by being displayed, demonstrates the | |
computational effort that was performed in order to discover it. Cryptocurrency mining adds | |
Michael Culhane's Blog: Authentic Blockchains and Bogus Blockchains | |
4 | |
more PoW to a blockchain as more blocks are added to the chain. PoW is the only measure | |
by which participants in a distributed network reach a consensus without trusting any human | |
authorities. | |
PoW transforms a database into a digital monument, which reflects the work required to | |
construct it. Andreas Antonopoulos has eloquently observed that the Bitcoin blockchain’s | |
PoW resembles Egypt’s majestic pyramids and Europe’s exquisite cathedrals. In stark | |
contrast, bogus blockchains, which do not embody proof of any significant work, resemble | |
Barbie-doll houses and the “cookie-cutter” tract housing developments found in America’s | |
suburbs. | |
The energy required to generate PoW is an ineluctable cost a blockchain incurs in order to | |
bring trustless-ness, individual autonomy, and savings in human labor (also known as “social | |
scalability,” a term coined by Nick Szabo) to a network’s participants. | |
Bitcoin’s adversaries frequently cite inaccurate and irrelevant statistics such as: “Bitcoin | |
requires X amount of energy to process Y transactions,” or “Bitcoin requires X amount of | |
energy to issue Y new coins.” These statistics are subsequently used to discredit Bitcoin for | |
being woefully inefficient and inferior to centralized systems or other cryptocurrencies. This | |
line of thinking fails to recognize that Bitcoin mining does not exist to validate transactions or | |
to mint new coins. | |
Bitcoin mining exists for the sole purpose of consuming expensive resources. Any | |
“blockchain” that does not incur the cost of a significant amount of energy to produce it is | |
either an unsecured blockchain or a bogus blockchain. Mining continues to make tampering | |
with a blockchain’s information more prohibitively expensive over time, although it is never | |
possible to attain the Holy Grail of perfect immutability. The more energy that is consumed | |
to generate PoW, the more secure a blockchain’s information will be (i.e., the better a | |
blockchain will be serving its sole purpose). | |
Proof of Work Protocol | |
PoW protocol is a set of rules a blockchain-based network’s participants mutually and willingly | |
obey. A network’s participants make a blockchain useful by adhering to PoW protocol. Under | |
PoW protocol, participants always consider to be authoritative that version of a blockchain | |
which demonstrates proof of the most work performed on it. This is also known as the act of | |
Michael Culhane's Blog: Authentic Blockchains and Bogus Blockchains | |
5 | |
forming a “Nakamoto Consensus.” Apart from PoW, there is no determinate measure by which | |
the genuine version of a blockchain can be identified. Without such a measure, one must rely | |
on human trust. | |
PoW protocol mandates that a network’s participants place their trust in computing power | |
rather than in a human authority, in order to authenticate the historical record of its | |
information. This protocol successfully secures a blockchain, even though some centralized | |
miners control significantly more computing power than a typical participant does. | |
Computing power relies on energy, which is a finite resource. When the participants | |
in a network conform to PoW protocol, they ensure that a malicious actor must spend | |
considerable energy to frustrate honest actors’ expectations. This deterrent virtually | |
guarantees that the reward attained by acting honestly is greater than any ill-gotten gains | |
that can be acquired by using the system unethically. In order to launch an attack that | |
is statistically likely to mutate the blockchain fraudulently, a malicious actor or team of | |
malicious actors must spend more resources than all of the resources spent by half the | |
entire network (including those expended by all other malicious actors). | |
Even if such an attack should prove successful, only the following damage could be inflicted | |
on the network: | |
1. Malicious alterations to its blockchain that erase historical transactions (alterations | |
which increasingly become more difficult to effect as time passes); and | |
2. Prevention of the processing of specific transactions for as long as the attack | |
continues. | |
A malicious actor can benefit financially from such an assault only by fraudulently reversing | |
her recent transactions. This is known as the “double-spending” attack. No attacker can | |
initiate invalid transactions using money that other participants own. No attacker can | |
counterfeit new money. PoW protocol ensures that, for an attacker to be able to “counterfeit” | |
new money, she would need to prove that she has performed work to create it, which means | |
that she actually would have earned it. | |
By submitting to PoW protocol, participants interact with an immutable blockchain, gain | |
rewards for its upkeep, and freely compete with one another to reap those rewards. | |
Participants benefit from these opportunities only by adhering to the protocol. Markets and | |
physical laws, not positive law or social influence, govern PoW protocol. | |
Michael Culhane's Blog: Authentic Blockchains and Bogus Blockchains | |
6 | |
Alternatives to PoW | |
PoW converts computational power into voting rights that are used to form a consensus, | |
which validates transactions. Computational power, rather than a true democracy in which | |
each individual is represented by an IP address in a network, must cast the decisive number | |
of votes needed to reach a consensus because of a threat known as a “Sybil Attack.” | |
Such an attack is one in which an individual actor controls multiple computers and forges | |
identities, by pretending each of her computers is controlled by a separate individual. This | |
threat deters a network’s participants from attempting to reach a consensus based on a | |
majority vote by network nodes. | |
Any attempt to replace the PoW consensus algorithm is unobjectionable, as long as those | |
who make such an effort still intend to preserve a blockchain’s true goal: to approach as | |
closely as possible the immutability of information without relying on trust in a human | |
authority. Bogus blockchains provide no such benefit to consumers. | |
Some proponents of blockchains are exploring alternatives to PoW, mainly out of | |
environmental concerns. A proposed alternative blockchain protocol called Proof of Stake | |
(PoS) is gaining popularity, although it is unproven and seems likely to be flawed. | |
The overarching issue concerning the PoS protocol is that under it the cost of forging a new | |
copy of the blockchain is derisory. This is known as “costless simulation,” which essentially | |
means that the cost of “rewriting history” is inconsequential. | |
To paraphrase Greg Maxwell, the focus on a stake being recorded on a blockchain under | |
PoS distracts us from understanding that there is no determinate measure which proves | |
that the information being recorded is a real stake. Under PoS there is no trustless means | |
of identifying which version of a blockchain is the real one. The only way for a participant to | |
ascertain that a blockchain is authentic, if he has not monitored it since its inception, is to | |
trust a human authority. If presented with competing versions of a blockchain, participants | |
who have not constantly observed the blockchain ab initio, would need either to honor the | |
result of a vote held by network nodes (which reintroduces the danger of Sybil Attacks), or | |
to rely on a trusted authority. This is sometimes referred to as “ask a friend” security, and it | |
defeats the purpose of a blockchain. | |
Michael Culhane's Blog: Authentic Blockchains and Bogus Blockchains | |
7 | |
Under Proof of Stake there is not necessarily anything at stake. Proof of Work, on the other | |
hand, is a real Proof of Stake in which the stake (electricity) has value that is extrinsic to the | |
blockchain. | |
Applications of Blockchain | |
A blockchain is a platform on which a network’s participants share information and trade | |
with one another. It is a virtual marketplace. For a blockchain to be useful for an application, | |
the application must require an immutable record. Information that flows from a continuous | |
stream is used to compile that record. A network’s participants stream that information | |
to the network’s miners, who relay it in batches to the blockchain. For a blockchain to be | |
feasible for an application, such an application must motivate workers to secure it with PoW. | |
Trustless finance happens to be a perfect application of blockchains. It is hard to imagine a | |
practical application that does not involve trustless finance in which a blockchain would be | |
both useful and feasible. | |
Three of blockchain’s applications have already proved to be successful. Blockchain has | |
eliminated the need to place trust in businesses or political authorities: | |
1. To store digital financial assets; | |
2. To intermediate digital financial transactions; and, | |
3. To administer the issuance of digital money. | |
If a business or political authority is using what it refers to as a “blockchain” to help it | |
maintain its position as a trusted source of information, then it is relying on a traditional | |
database purporting to be a “blockchain” (i.e., it’s nothing but a bogus blockchain). Whatever | |
useful purpose is achieved in this context can be accomplished by a traditional trust-based | |
system. | |
Centralized trust, it should be acknowledged, will always attract clients. Unless there is a | |
significant cultural and psychological shift (which is certainly a possibility), most individuals | |
will not want autonomy in every aspect of their finances, and perhaps most businesses will | |
want complete autonomy in almost no aspect of their finances. But to have real autonomy in | |
even a single aspect of one’s finances (e.g., managing a portion of one’s savings or making a | |
political donation while living under a dictatorial regime) requires a system in which no actor | |
can control any other actor’s money. | |
Michael Culhane's Blog: Authentic Blockchains and Bogus Blockchains | |
8 | |
Antonopoulos uses the terms “soft promise” and “hard promise.” Applying his terms to | |
the concept of “software layers,” a soft layer is one in which information and transactions | |
are malleable, controllable, and reversible. A hard layer is one in which information and | |
transactions are final and tamper-proof. All traditional computer records are soft, but a | |
blockchain is hard because of its PoW. The physical element of PoW empowers a blockchain | |
to transcend the traditional hardware/software divide. A blockchain is essentially hardware | |
embedded within software. | |
Financial operations can never truly be finalized within systems in which the base layer is | |
“soft.” Soft systems that support reversible financial transactions, however, can be built | |
on top of a hard layer. Although gold provides a hard layer to consumers who trade with | |
one another using that metal as a medium of exchange, cryptocurrencies have attributes | |
that make them useable in many transactions in which gold either cannot be used or is | |
inconvenient to use. | |
A network can remain neutral and trustless only if the finality of its information is secured | |
by a blockchain, and that blockchain can exist only if a cryptocurrency is associated with | |
it. Securing a blockchain requires physical work, and in a neutral system people naturally | |
are unwilling to work for free. If there is no financial incentive to secure a blockchain, then | |
it will not be properly secured. If securing a blockchain becomes unprofitable, it is highly | |
unlikely that enough work will be performed to secure it until workers (i.e., miners) receive a | |
sufficient reward for doing so. | |
A cryptocurrency must exist on, and originate directly from, a blockchain. It is impossible | |
for a blockchain cryptographically to secure a guarantee of any physical asset. If the unit of | |
account recorded on a blockchain is not itself valued, then that blockchain cannot be useful | |
qua blockchain. | |
Any database designed to serve only as the balance sheet for external assets (i.e., any | |
database that records only derivatives) is not a blockchain. Such an application trustingly | |
presumes that any attempt to redeem the underlying asset should be honored. For this type | |
of application, a centralized system is sufficient. | |
Cryptographic mechanisms that permit the secure and trustless opening of peer-to-peer | |
payment channels do, however, exist--to create networks for routing transactions outside | |
blockchains. Such mechanisms will likely dramatically scale the performance of, and | |
increase the privacy of, cryptocurrency-based transactions. | |
Michael Culhane's Blog: Authentic Blockchains and Bogus Blockchains | |
9 | |
Antonopoulos has recently introduced a concept he calls “Immutability as a Service.” This | |
would entail the Bitcoin blockchain’s PoW being used as a tamper-proof source of truth for | |
non-blockchain applications, so that they can benefit from Bitcoin’s PoW. Bitcoin miners | |
could offer their PoW to secure information which, for example, legal systems based on | |
English common law could reference in order to enforce ownership of assets. Such an | |
application of the Bitcoin blockchain’s PoW would still require trust in a human authority. This | |
kind of application would be indirectly enforced by a blockchain but would not itself be directly | |
interwoven with a blockchain. | |
Net Neutrality | |
A salutary refusal to accept trust is most significant in the context of neutrality. Neutral | |
networks are freely distributed and open to everyone. Because blockchains are nothing | |
more than secured records of information, they are inherently neutral. If a network does | |
not enable free participation, then eventually some parties almost certainly will be excluded | |
and oppressed by it. Furthermore, if a network is not open to everyone, then some actor or | |
group of actors will be able to, and motivated to, dictate whom to exclude. Such a network | |
inevitably will be susceptible to corruption. | |
Net neutrality in a financial system governed by a blockchain is the only proven defense | |
against inexpensive corruption. From the consumer’s perspective, neutral networks of | |
participants who honor blockchain governance are the only means of maintaining trustlessness | |
in the three financial functions I identified above. | |
If a network is neutral, no extenuating circumstances can render it non-neutral. A neutral | |
network cannot make allowances for extenuating circumstances, because it cannot tolerate | |
the existence of an authoritarian controller who decides what constitutes an extenuating | |
circumstance. “Partial neutrality” is an oxymoron. | |
A monetary system is either neutral and free or it is centrally controlled. These two | |
alternatives are not only mutually exclusive but constitute a dichotomous and exhaustive | |
classification of all monetary systems. Notwithstanding many voices to the contrary, control | |
of an entire system is decidedly different from any concentration of power within that system. | |
Blockchain governance of neutral networks is also the only proven way to guarantee | |
autonomy for participants, as well as for networks themselves. Participants can be financially | |
Michael Culhane's Blog: Authentic Blockchains and Bogus Blockchains | |
10 | |
autonomous with respect to their ownership and use of digital assets because they no longer | |
need to rely on trusted third parties, which are--by definition--security vulnerabilities. The | |
networks are autonomous because they do not require a central administrator to supervise or | |
maintain them. No person or group plays a necessary role in their maintenance. The networks | |
will persist even if any given participant or group of participants leave them. A single system’s | |
financial functions can be performed globally and seamlessly, without any intermediaries | |
blocking or decelerating them. | |
Bogus Cryptocurrencies | |
According to news reports, Russia will issue a new digital currency and refer to it as the | |
“CryptoRuble” The first two syllables of the word “cryptocurrency” are not “crypto” because | |
they denote cryptographic hash functions deployed to sign transactions. These are called | |
digital signatures and they are not unique to cryptocurrencies or even to financial computer | |
applications. Instead, we say “crypto” because we maintain a blockchain that tracks the | |
transactions in a currency, and we place trust in the version of that blockchain on which the | |
most cryptographic hash functions have been computed. In other words, we call a currency | |
“cryptocurrency” because its blockchain is secured by PoW and the holders of the currency | |
follow PoW protocol. | |
If Russia’s proposed CryptoRuble uses a freely distributed blockchain and participants | |
in its network honor PoW, then it will be a cryptocurrency. This means that the Russian | |
government will have no power to control it. A currency controlled by a government cannot be | |
a cryptocurrency. The reason for this is simple: If it is a cryptocurrency, it is not controlled by | |
a government. | |
We have already seen that Russian propaganda can be effective and insidious. Do not be | |
bamboozled by any governmental propaganda, no matter which nation state originates it. | |
The Importance of Clear Terminology | |
Consider the following three scenarios in which one might refer to the databases described in | |
them as “blockchains:” | |
1. Referring to each batch written to a database as a “block;” | |
2. Multiple parties being given access to the same database; and, | |
Michael Culhane's Blog: Authentic Blockchains and Bogus Blockchains | |
11 | |
3. A consortium of parties operating within a silo, with each party maintaining its own | |
version of a ledger and auditing and error-checking the others’ versions. | |
None of these scenarios justifies calling the database in it a “blockchain.” Simply saying | |
“database” or “shared ledger” suffices. The act of sharing certain information with users that | |
was previously kept private from them does not in itself obviate the need for trust. Therefore, | |
any application that merely focuses on transparency does not require a blockchain and is not | |
relevant to this discussion. A blockchain is not used because it is transparent. Many users | |
actually consider transparency to be dangerous and undesirable. A blockchain is used to | |
avoid trusting any human authority. | |
Definitions might seem to be a trivial matter, but the deleterious consequences of imprecise | |
language cannot be overstated and must not be overlooked. No honest salesperson would | |
stand outside a helmet store and sell hats to customers, branding the hats “helmets.” Not | |
even a hat designed to include a helmet’s adventitious characteristics is a helmet. A hat with | |
a chin strap is still a hat, not a helmet. This is because helmets are designed specifically to | |
offer that which hats cannot provide: protection. | |
Presented with hats and helmets, any consumer would immediately see the differences | |
between them. But because blockchains and cryptocurrencies are such technical subjects, | |
consumers can easily be misled by their esoteric intricacies. With the hat-helmet example | |
in mind I hope that, in most instances, the use of the word “blockchain” to describe what is | |
really a bogus blockchain is merely the result of ignorance rather than of dissimulation. | |
Conclusion | |
Bitcoin presents us with free money. In this context, the word “free” can have two meanings: | |
free of control and free of cost. Bitcoin is free of control because it is a distributed network, | |
and it is not free of cost because its participants value only PoW. Fiat currency, however, is | |
not free of control and--for those who control it--it is totally free of cost. | |
Both the power and value of a neutral network governed by a blockchain are directly | |
proportional to the number of participants in the network who honor that blockchain’s | |
governance. A cryptocurrency becomes more established, and therefore more stable and | |
treasured, as the number of people willing to adhere to its protocol increases. In this respect, | |
cryptocurrencies are no different than fiat currencies. | |
Michael Culhane's Blog: Authentic Blockchains and Bogus Blockchains | |
12 | |
To put into perspective how extraordinary Bitcoin is, consider that Satoshi wrote the code for | |
Bitcoin before he started to write his white paper. He said that when he conceived Bitcoin | |
he had to write the code first and then physically see it running, before he could convince | |
himself that his conception was realizable. | |
Bitcoin’s adversaries frequently utter a pathetic platitude along the following lines: “Bitcoin is | |
impractical, but the underlying blockchain technology that it runs on is the real innovation.” | |
When people say that they support blockchain but not Bitcoin, they should pointedly be asked | |
whether they actually mean that they prefer a bogus blockchain because it allows them to | |
continue to exert authoritarian control over a service that cryptocurrencies are now providing. | |
As I submit this post, Bitcoin still has unfortunate limitations regarding its user experience, | |
security, and feasibility–all of which make using it relatively difficult, risky, and expensive. It | |
is also currently impossible to use on a global scale. For now, these shortcomings induce | |
Bitcoin enthusiasts to continue to depend on centralized financial systems. Backward-looking | |
pundits in the monetary debate use these drawbacks as a pretext for arguing that Bitcoin will | |
never work. Forward-looking innovators will discover ways to help consumers overcome these | |
real but not insurmountable obstacles. | |
164 Views Tags: bitcoin, blockchain, cryptocurrency | |
Michael Culhane in response to Elijah Alper on page 12 | |
Jan 4, 2018 4:13 AM | |
Thanks for the feedback, Elijah Alper. | |
Regarding your second point, I think that if you take another look, you will see that we are actually in | |
agreement. I never state that trust-based shared ledgers are worthless, nor do I wish to imply that idea. My | |
intention is to convey that they are nothing new and that they are not blockchains. Blockchains serve a specific | |
purpose that centrally-validated systems do not. | |
I expect that we will use centralized records of information for as long as we communicate with one another, | |
including for financial applications. But emerging technology and cultural changes can, and probably will, | |
continue to drive consumers increasingly towards blockchains. One way to impede this, which I point out, is | |
through semantic dissimulation. Another way, which you point out, is through coercion. | |
Elijah Alper | |
Jan 3, 2018 9:14 PM | |
Michael Culhane's Blog: Authentic Blockchains and Bogus Blockchains | |
13 | |
Thank you for the great read. I think you make a compelling point that non-immutable distributed ledgers that | |
by design require trust in some parties are not "blockchains," as you define blockchain. | |
I also think these "distributed ledgers" may well have value in certain cases. To the extent you are saying that | |
they are worthless (e.g., some of the adjectives you use), more is needed to prove that point. | |
Finally, I would not underestimate the ability for governments control even pure public blockchains. Ask people | |
in China if the Internet is really free and open to all. Seems like some targeted threats or hostage-taking of | |
core developers or owners of mining consortiums might do a lot of damage. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment