360° Coverage : Bitcoin Security Model: Trust By Computation

2 Updates

Bitcoin Security Model: Trust By Computation

Feb 20 2014, 5:24pm CST | by

By Andreas Antonopoulos Bitcoin is a distributed consensus network that maintains a secure and trusted distributed ledger through a process called “proof-of-work.” Bitcoin fundamentally inverts the...

Filed under: news

 
 
 

30 weeks ago

Bitcoin Security Model: Trust By Computation

Feb 20 2014, 5:24pm CST | by

By Andreas Antonopoulos

Bitcoin is a distributed consensus network that maintains a secure and trusted distributed ledger through a process called “proof-of-work.”

Bitcoin fundamentally inverts the trust mechanism of a distributed system. Traditionally, as we see in payment and banking systems, trust is achieved through access control, by carefully vetting participants and excluding bad actors. This method of trust requires encryption, firewalls, strong authentication and careful vetting. The network requires investing trust in those gaining access.

The result is that such systems tend to be closed and small networks by necessity. By contrast, bitcoin implements a trust model of trust by computation. Trust in the network is ensured by requiring participants to demonstrate proof-of-work, by solving a computationally difficult problem. The cumulative computing power of thousands of participants, accumulated over time in a chain of increasing-difficulty proofs, ensures that no actor or even collection of actors can cheat, as they lack the computation to override the trust. As proof-of-work accumulates on the chain of highest difficulty (the blockchain), it becomes harder and harder to dispute. In bitcoin, a new proof-of-work is added every 10 minutes, with each subsequent proof making it exponentially more difficult to invalidate the previous results.

Here’s the most important effect of this new trust model of trust-by-computation: no one actor is trusted, and no one needs to be trusted. There is no central authority or trusted third party in a distributed consensus network. That fact opens up a completely new network model, as the network no longer needs to be closed, access-controlled or encrypted. Trust does not depend on excluding bad actors, as they cannot “fake” trust. They cannot pretend to be the trusted party, as there is none. They cannot steal the central keys as there are none. They cannot pull the levers of control at the core of the system, as there is no core and no levers of control.

As a result, the network can be open to all; the transactions can be broadcast on any medium, unencrypted; and applications can be added at the edge without vetting or approval. In other words, bitcoin is not just money for the Internet, it is the Internet of money — an open, de-centralized, standards-based network where innovation can occur at the edge without permission and where the network itself is simply a neutral and open transport layer.

Like the Internet and other open networks, blockchain-based crypto-currency networks are susceptible to denial-of-service and other nuisance attacks. Attacks that cannot violate the trust of the distributed asset ledger, but can clog the pipes and attempt to confuse the participants. When such attacks occur, they can cause deep concern among those who have a predilection for the security model of access control. If a bad actor gains access to a closed financial network, the results are catastrophic. Open access and trust are fundamentally at odds in a closed centralized network based on access control. Therefore, within that context, a denial of service attack or any bad actors on the network have dire consequences and signify a compromise of security and a failure of the trust model.

On bitcoin and other open crypto-currency networks, however, bad actors on the network are inconsequential because the trust model does not depend on excluding them. The bad actors are not trusted any more than any other user of the network and their access does not grant them any special rights. The trust model depends on computation and the demonstration of computation through proof-of-work. As long as good actors form the majority of the computation used for forming consensus, the bad actors cannot change the trusted ledger.

It will take time for the idea of decentralized trust through computation to become a part of mainstream consciousness, and until then, the idea creates cognitive dissonance for those accustomed to centralized trust systems. With thousands of years of practical use, centralized systems of trust are accepted unconditionally and without much thought as the only model of trust.

Until recently, decentralized trust at scale was not possible. Now that it is, it conflicts with most people’s understanding of the world. That’s why when you explain crypto-currencies to people, they immediately search for the central actor or authority that establishes the trust, establishes the value or has the control: “Yes, I see it is decentralized, but who runs it? Who controls it? Can’t someone take over?” These questions reveal the context of trust centralization, which is deeply embedded in our culture and our thinking. We’ve been taught to fear the bad actor and look for self-interested “trusted” individuals; we no longer have to do that.

Gradually, decentralized trust will be accepted as a new and effective trust model. We have seen this evolution of understanding before — on the Internet. The Internet led to the decentralization of authority-of-opinion, by making it possible for anyone to be a publisher without a multi-story building-sized printing press. At first, this challenged our expectations and forced us to reconsider the source of authority. If anyone could have an opinion and publish it, how can we tell which opinions are important? We had used the centralization of printing presses and distribution and the purchasing of ink by the barrel as a proxy metric of authority, to help us filter our news and opinions. Suddenly, we were thrust into a new world in which these anchors of authority were swept away and each opinion had to be judged by its merits, not the size of the publisher’s press.

Now, we must rethink the source of trust in networks and the source of monetary value of currencies, disconnected from the issuer, without a central authority and without the need for access control. The trust model has already changed, but it will take a while for society to accept that a new model is possible.

This post originally appeared on O’Reilly Radar. (“Bitcoin security model: trust by computation”). It’s been republished with permission.

Source: Forbes Business

 
Update
2

2 weeks ago

Khazanah throws MAS RM6b lifeline

Aug 29 2014 5:01pm CDT | Source: Business Times Singapore

August 30, 2014 1:15 AMKHAZANAH Nasional will inject RM6 billion (SS$2.4 billion) over three years to resuscitate loss-making Malaysia Airlines (MAS) under a recovery plan that includes even an Act of Parliament. Other key moves are migrating its operations, assets and liabilities to a new company (NewCo) and slashing the ...
Source: Business Times Singapore   Full article at: Business Times Singapore
 

 
Update
1

3 weeks ago

MAS posts loss of RM307m for Q2

Aug 28 2014 5:00pm CDT | Source: Business Times Singapore

August 29, 2014 1:13 AMMALAYSIA Airlines (MAS) registered a loss of RM307 million (S$122 million) for the second quarter to end-June, but warned of worse to come in the second half when the "full financial impact of the double tragedies of MH ...
Source: Business Times Singapore   Full article at: Business Times Singapore
 

 

Don't miss ...

 

<a href="/latest_stories/all/all/30" rel="author">Forbes</a>
Forbes is among the most trusted resources for the world's business and investment leaders, providing them the uncompromising commentary, concise analysis, relevant tools and real-time reporting they need to succeed at work, profit from investing and have fun with the rewards of winning.

 

blog comments powered by Disqus

Latest stories

Ebola hit countries to lose $809 million by 2015: World Bank
This projected loss will be the medium-term impact of the outbreak of the Ebola Virus Disease (EVD) on these countries, Xinhua reported.
 
 
Russian food ban deals blow to Austrian pork farmers
Vienna, Sep 19 (IANS) Russian import ban imposed in retaliation for Western sanctions over the Ukraine crisis brought down the price of pork in Austria, affecting the farmers in the country.
 
 
Russia seeks to keep out foreigners from media business
Moscow, Sep 18 (IANS) Russia will soon introduce a bill in parliament to restrict foreign ownership in Russian media, a media report said Thursday.
 
 
France to help set up hospital in Guinea to fight Ebola
Paris, Sep 18 (IANS) French President Francois Hollande Thursday said his country would help set up a military hospital in Guinea to assist in the fight against the deadly Ebola virus in west Africa.
 
 
 

Latest from the Network

Dylan Penn wants to be a director
Dylan Penn wants to be a director one day. The 23-year-old stunner - the daughter of Sean Penn and Robin Wright - is set to make her acting debut in the horror movie 'Condemned' next year and she's also got her heart...
Read more on Celebrity Balla
 
Undelivered aid commitments hamper progress on MDGs: UN report
United Nations, Sep 19 (IANS) A UN report released here Thursday said that undelivered aid commitments by developed countries are holding back progress on the eight anti-poverty targets known as the Millennium...
Read more on Politics Balla
 
Israel not to tolerate 'drizzle' of rockets: PM
Jetusalem, Sep 19 (IANS) Israel's Prime Minister Benjamin Netanyahu said Thursday that Hamas knows well that Israel will not tolerate a "drizzle" of rocket fire from the Gaza Strip, according to a statement released by...
Read more on Politics Balla
 
Obama pledges diplomatic resolution of Ukraine crisis
Washington, Sep 19 (IANS) US President Barack Obama Thursday pledged continued efforts to seek a diplomatic solution to the Ukraine crisis. "In addition to the concrete expressions of support through security...
Read more on Politics Balla
 
Luke Evans wants to dine with Meryl Streep
Los Angeles, Sep 19 (IANS) If actor Luke Evans had a chance, he would love to take Oscar winning actress Meryl Streep for dinner someday. He finds Streep to be quite "lovely". "I'd like to have dinner with Meryl...
Read more on Celebrity Balla
 
US Senate approves plan to train, arm Syrian rebels
Washington, Sep 19 (IANS) The US Senate Thursday approved President Barack Obama's plan to train and arm Syrian rebels in the efforts to fight the Islamic State (IS) militant group, a day after the House of...
Read more on Politics Balla
 
Security ramped up after terror plot on Australian Parliament revealed
Melbourne, Sep 19 (IANS) Australian authority Friday has ramped up security in the capital of Canberra after potential terror attack plot against the Parliament House and the country's top leaders was traced....
Read more on Politics Balla
 
Jay Z, Beyonce renew wedding vows
Los Angeles, Sep 19 (IANS) Singers Jay Z and Beyonce Knowles, who have been surrounded by rumours that their marriage is in trouble, reportedly renewed their wedding vows when the latter celebrated her 33rd birthday...
Read more on Celebrity Balla
 
Jessica Simpson is 'done' having kids
Jessica Simpson is ''done'' having children. The 34-year-old star and her new husband Eric Johnson already have two-year-old daughter Maxwell and 14-month-old son Ace together and they are adamant they don't want to add...
Read more on Celebrity Balla
 
Rosie Huntington-Whiteley had posters of 'beautiful women' on wall
Rosie Huntington-Whiteley used to have posters of ''beautiful women'' hung on her bedroom wall. The 27-year-old star, who is dating Jason Statham, admits she's never been one to have pictures of hunky men stuck up...
Read more on Celebrity Balla