Page 156 - ITU-T Focus Group Digital Financial Services – Technology, innovation and competition
P. 156

ITU-T Focus Group Digital Financial Services
                                              Technology, Innovation and Competition



               There are also reportedly flaws prevalent in smart contract blockchain codes:  while there have been important
                                                                              68
               academic studies of vulnerabilities in blockchain,  automated software applications that may detect these
                                                         69
               flaws before they are exploited and lead to loss are only now being developed.
                                                                                 70



               5      Challenges in implementation of DLTs



               5.1    Overview

               DLT provides opportunities to innovators and may challenge the current role of trusted intermediaries that have
               positions of control within a centralized hierarchy.  But while the technology matures and the ‘tires are kicked’,
                                                        71
               there are current and evolving concerns that will need to be addressed in both developed and developing world
               contexts. These range from confidentiality of data, user privacy, security of blockchains, legal and regulatory
               issues, and fragmentation of the technology, as well as the veracity of the data placed on a blockchain. 72


               5.2    Privacy and confidentiality of data

               Current methods of data storage on centralized systems have always been vexed by attempted and successful
               intrusions.  Database controllers attempt to harden these systems against data compromise and leak of private
                        73
               and confidential information through inter alia tightly controlling access through just one or more trusted
               (central) parties and by encrypting databases. 74
               With the distributed node motif embedded in the DNA of most DLTs, they have a different perspective to
               the storage of data and access thereto. That is, data on blockchains in large measure should be visible to
               everyone – the nodes ‒ on that blockchain.  The ostensible reason for this is that to validate additions of
                                                     76
                                  75
               data to the chain, nodes must have visibility over the data they are validating.  In theory then, everyone could
                                                                               77
               see everyone else’s data, at all times.
               And, although access to a blockchain requires a private key, not all of the information on a blockchain is
               encrypted.  For example, on the Bitcoin permissionless, public blockchain, data is pseudo-anonymous: The
                        78
               user’s ID is self-asserted and encrypted, but transactional data is not.


               68   See in relation to issues discovered with the Ethereum blockchain; Buterin, V (2016) Thinking About Smart Contract Security,
                  available at https:// goo. gl/ iH78GN ; and Daian, P (2016) Chasing the DAO Attacker’s Wake, available at https:// goo. gl/ DxgOHD.
               69   See Cornell Sun (2016) Cornell Prof Uncovers Bugs in Smart Contract System, Urges More Safety in Program Design, available at
                  https:// goo. gl/ d6d4F2 .
               70   See Olickel (2016) ibid
               71   They also offer authorities a new, and almost real-time, access to data for compliance (RegTech) purposes, while blockchains
                  such as Bitcoin that create new decentralized currencies may challenge the current supremacy of governments in managing
                  the national and international economic and monetary systems. On the disruptive possibilities of DLTs and the implications, see
                  Mills et al (2016) ibid; UK Government Office for Science (2016) ibid; Credit Suisse (2016) Blockchain, available at https:// goo. gl/
                  1YT6Ci; IBM (2016) ibid; Accenture (2016) Blockchain Technology: How Banks Are Building a Real-Time Global Payment Network,
                  available at https:// goo. gl/ 5bHSd4 .
               72   There are other challenges, but as noted earlier, these are beyond the scope of this paper.
               73   See for example, BI (2016) 1 Billion Yahoo Accounts Have Been Stolen in the Biggest Hack Ever — Here's What You Should do,
                  available at https:// goo. gl/ lnKf4j .
               74   Of course, these characteristics have their advantages and disadvantages. That is, centralized access through trusted parties, but
                  a potential single point of failure where an intrusion could expose data.
               75   These nodes may be trustless.
               76   As noted below, some newer blockchains design solutions so that some parties can only read the blockchain, while others can
                  also sign to add blocks to the chain
               77   Even so, there have been instances where identities of blockchain users have been discovered using transaction graph analysis.
                  This uses the transparency of the transaction ledger to reveal spending patterns in the blockchain that allow bitcoin addresses
                  – using IP addresses and IP address de-anonymization techniques - to be bundled by user. Ludwin, A (2015) How Anonymous is
                  Bitcoin? A Backgrounder for Policymakers, available at https:// goo. gl/ DJnIvP .
               78   This also depends on the blockchain design. A blockchain can have all of its data encrypted, but signing/creating the blockchain
                  wouldn’t necessarily be dependent on being able to read the data. An example may be a digital identity blockchain.



                136
   151   152   153   154   155   156   157   158   159   160   161