Page 14 - FIGI: Security Aspects of Distributed Ledger Technologies
P. 14

Figure 1: ‘Trilemma’ in the DLT ecosystem.



















            While there are now a number of trilemmas, the original ‘blockchain trilemma’ developed by Ethereum founder Vitalik
            Buterin shows that two but not all three conditions may exist at the same time. Security and scalability of a DLT is a
            common feature of a number of ‘trilemmas.’ 2

            es are being focused by a burgeoning DLT industry   its underlying technology and traded under the tick-
            globally on solving any security vulnerabilities that   er symbol BTC.
            are emerging. High-profile security hacks that have   To illustrate the loci of the attacks from threat vec-
            led to losses for users, as well as initiatives to deploy   tors, we use an adapted version of a published  DLT
                                                                                                        9
            DLT solutions in enterprises, central banks and the   architecture using a layered approach. These layers
            wider economy have all added to the impetus for    are shown in Figure 4� These layers are integrated
            getting in front of and finding solutions to any vul-  into the  most  prominent  security  concerns,  based
            nerabilities.                                      on those threats, risks and vulnerabilities that this
               Cyber-security challenges are far greater in what   report identifies as having the most coincidence to
            are  called  public,  permissionless  DLTs  where  there   financial inclusion, shown in  Figure 5�  Each threat
            are no walled gardens which only allow access to   and attack is described in terms of its effect on
            known, trusted participants. This creates a challeng-  one or more of these abstract layers. Where possi-
            ing environment where everyone has access but no   ble, mitigation measures and recommendations are
            one can be trusted.                                described cumulatively for each threat and its cor-
               While the flavors of blockchain are all addressing   responding vulnerability and risk. Context of each
            low  scalability  and low processing speed issues,    threat described will indicate whether the mitigant/
                         3
                                                          4
            all related to the so-called blockchain ‘trilemma’  –   recommendation applies to entities running DLTs,
                                                        5
            shown in Figure 1 - representing a widely held belief   end customers, regulators, or developers of DLTs – or
            that the use of blockchain technology presents a   to a multitude of these actors. Annex D summarizes
            tri-directional compromise in efforts to increase   the threats to these layers alongside the concerns.
            scalability, security and decentralization  and that   Given space constraints and readability, the secu-
                                                 6
            all three cannot be maximized at one time. That    rity components discussed in this paper do not rep-
            is, increasing the level of one factor results in the   resent the totality of all published security issues
            decrease of another.                               related to DLTs and the crypto-economy, but the
                              7
                                                               most prominent and proximate to financial services
            3�2  Methodologies and Approaches Used In This     and a developing world context.
            Report                                               Research for this paper was conducted through
            This  report  embraces and  uses the technical term   desktop research and direct interactions by the
            Distributed Ledger Technology (DLT) to describe all   author with regulators and ecosystem develop-
            distributed ledgers, no matter what underlying DLT   ers  and  participants,  as  well  as  other  experts.  The
            technology or protocol is used.  Where needed, the   author thanks them for their invaluable and forth-
                                        8
            term blockchain is used interchangeably with DLT as   right insights.
            the primary exemplar of DLTs.                        The technologies cited, as well as any laws, poli-
               Overall, unless otherwise stated, any reference to   cies, and regulations cited are as of May 31, 2019.
            ‘Bitcoin’ is to what is now known as Bitcoin Core and



            12   Security Aspects of Distributed Ledger Technologies
   9   10   11   12   13   14   15   16   17   18   19