Page 158 - ITU-T Focus Group Digital Financial Services – Technology, innovation and competition
P. 158

ITU-T Focus Group Digital Financial Services
                                              Technology, Innovation and Competition



               Nonetheless, the underlying code in any blockchain may be a security issue: The exploitation of a flaw in the
               Ethereum blockchain led to the immutability paradigm of blockchain being necessarily violated by its creators
               to restore (potentially) lost funds. 90
               Despite the use of strong cryptography, DLTs are not necessarily a panacea for security concerns people
               may have. Indeed, there is a tradeoff between replacing costly – and often risky ‒ intermediaries with
                        91
               cryptographic key-only access distributed across nodes.  For example, for permissioned ledgers replacing
                                                               92
               centralized intermediaries, the cost-benefit in using blockchain is somewhat ameliorated by the need to trust
               permissioned authors rather than relying solely on the nodes who offer the guarantee of ledger integrity. 93
               The issues are said to be thus: The more trusted parties per node that are needed, so too does the compromisable
               'surface area' of a distributed network increase. Also, requiring a third party private key management function
                                                      94
               is contradictory ‒ and possibly even nugatory ‒ to the core ‘disintermediation’ principles of DLTs. In all, these
               tradeoffs may arguably reduce the utility of DLTs.

               Authorized access is also an issue: Nodes on the blockchain are – using current protocols – said to be unable
               to distinguish between a transaction by an authorized, actual user and a fake transaction by someone who
               somehow has gained access to the blockchain trusted party’s private key.  This means that if a bad actor gains
                                                                           95
               access to a comprehensive banking blockchain that itself accesses all or of part of a core banking network
               blockchain ‒ or a real-time gross settlement system – then this breach would in effect be compromising all
               banks’ databases simultaneously.
                                           96
               Risk for loss of funds where credentials are controlled by a single entity was demonstrated in the recent
               compromise of the credentials used in the transfer of funds through the (non-DLT) SWIFT network from the
               Federal Reserve Bank of New York  to the central bank of Bangladesh, Bangladesh Bank.  To circumvent
                                                                                            98
                                             97
               or mitigate this type of risk, private key management functions or biometric linked private keys have been
               suggested. 99
               The issue of longevity of the security of blockchain-based data may also be an issue. For example, the possibility
               of ‘old’ transactions on a particular blockchain may be vulnerable to advances in cryptography over a period
               of years or decades such that ‘old’ transactions can be undetectably changed.
               A type of equivalence to this issue would be security compromises of the circa-1980s GSM ‒ and later
               generations of ‒ mobile communications encryption specifications affecting feature (non-smart) phones
               whose firmware cannot easily be updated with a fix for any vulnerabilities. The ability then to upgrade the
               cryptographic techniques used for ‘old’ transactions should be considered in DLT designs.


               5.4    Fragmentation in DLTs

               DLT-based solutions intrinsically rely upon multiple users for achieving critical mass: Nodes need more nodes to
               distribute the data, to do the validations of the blocks in the process of being added, and to do the processing


               90   Hertig, A (2016) The Blockchain Created by Ethereum's Fork is Forking Now, available at http:// www. coindesk. com/ ethereum-
                  classic- blockchain- fork- ddos- attacks/ .
               91   For public, permissionless (trustless) blockchains like Bitcoin where the use of nodes on the blockchain are publicly used to verify
                  transactions is a core feature, security of its blockchain – and not the vaults bitcoins are stored in - is ensured by syntactic rules
                  and computational barriers to mining. See also Greenspan (2016b) ibid.
               92   There is arguably also a trade-off in DLTs between security and transaction processing speeds. For a technical discussion thereof,
                  see Kiayias, A and Panagiotakos, G (2015) Speed-Security Tradeoffs in Blockchain Protocols, available at https:// goo. gl/ bgsTR8.
               93   The counterargument could be that a properly designed ‘permissioned’ network would be designed so that there is no sin-
                  gle-point of failure or central administrator who can unilaterally change the state. See Swanson (2015) ibid.
               94   Credit Suisse (2016) ibid; and Kaminska, I (2016) How I Learned to Stop Blockchain Obsessing and Love the Barry Manilow, avail-
                  able at https:// goo. gl/ mv3Lcy.
               95   Vermont (2016) ibid
               96   Greenspan (2016a) ibid
               97   The Federal Reserve Bank of New York is one of the 12 Federal Reserve Banks of the United States.
               98   Reuters (2016) Exclusive: New York Fed Asks Philippines to Recover Bangladesh Money, available at https:// goo. gl/ yqaJh7 .
               99   Vermont (2016) ibid



                138
   153   154   155   156   157   158   159   160   161   162   163