Page 18 - FIGI: Security Aspects of Distributed Ledger Technologies
P. 18

Table 2: Typical participants in a blockchain-based Distributed Ledger and the security aspects of their roles� 46


             Type                      Typical Role in Distributed Ledgers   Security Aspects
             Inventors                 First publisher of new DL technology 47  May not provide a method of collegial-
                                                                             ly updating a DL, leading to multiple
                                                                             forks.
             Developers                Independent parties who may improve on the   May not agree amongst themselves,
                                       initial DL technology                 leading to lapses in improvements
             Miners/Validators         Paid to add new data to blocks        Those with 51% mining power may act
                                                                             to unilaterally change the form and
                                                                             data structure on a DL
             Users                     Use data or value stored on a DL or exchange  May not sufficiently secure their PINs
                                                                             for wallets and exchanges.
             Oracles                   Provide input/output data for use in SCs  Usually insecure and may feed incor-
                                                                             rect data into a DLT
             Centralized Exchanges     Exchange tokens, custodians of token creden-  ‘Honey pot’ for hackers due to lack
                                       tials/keys, facilitate ICOs, STOs and IEOs  security implementations. May not
                                                                             implement security controls; DDOS
                                                                             attacks.
             Nodes                     Hold copies of a DL                   May go offline and thus increase pos-
                                                                             sibility that a DLT is compromised/
                                                                             hacked
             Auditors                  May test smart contracts for coding errors   Could catch and fix vulnerabilities
                                       and/or legal validity                 before exploitation
             DLT Network Operators     Define, create, manage and monitor a DLT   May not implement security controls;
                                       network. Each business in the network has a   DDOS attacks.
                                       blockchain operator. 48


               typically available online, such as from a standard   4�4  Processing Costs of Distributed Applications
               API from an information service provider.       and Risk Components
            •  Hardware: Data resulting from the physical world,   To execute transactions – such as smart contracts
               such as tracking a package in the mail or an item   – on a public blockchain, payment must be made
               as a result of an RFID scan, which may use Trusted   to those undertaking computing processes to add
               Execution Environments (TEE) – reporting read-  ‘blocks’ to the blockchain. An incentive for doing so
               ings of hardware without compromising on data   is required.  In the case of the Ethereum blockchain
                                                                        49
               security. 45                                    – specifically its core Ethereum It’s worth mention-
            •  Incoming/Inbound: Provision of data inbound     ing that in April the ETH mainnet got sooooo loaded
               from an external source.                        that the gas required to write a block soared to ~230
            •  Outgoing: Sends outgoing messages or signals    ETH (!), that is a major problem…since the more load
               to an external source as a result of what occurs   on an infra, the higher is the block cost, thus limiting
               on the blockchain network, e.g. a locker may be   throughput and lowering the usage. This is actually
               opened after payment of Ether is confirmed on   a game theory restriction that by-design keeps the
               the Ethereum network.                           usage of the infra low (!) Virtual Machine (EVM) – the
            •  Consensus/Decentralized Oracles: A decentral-   cost of this incentive to miners to add the blocks is
               ized system which queries multiple oracle sourc-  called ‘gas.’  The more complex the transaction steps
                                                                         50
               es with a consensus mechanism used to reach an   to be performed, usually the higher  the ‘gas’ fee.
                                                                                                            52
                                                                                               51
               acceptable outcome. While a decentralized oracle   DDOS attacks on a DLT though can ‘scramble’ the
               model could be used (see below), its feasibility   block additions, requiring owners to expend ‘gas‘
                                                                                                            53
               may be challenged by (i) the need for a standard-  fees on reverting the DLT to the same state pre the
               ized data format across each oracle; and (ii) result   DDOS attack. 54
               in substantial additional fee costs to the providers   As this can be infinite time - because of the ‘Tur-
               of each oracle and data source. (But see solutions   ing Complete’ nature of Ethereum  - so and use up
                                                                                             55
               providers below.)                               unlimited computational power, the developers of


           16    Security Aspects of Distributed Ledger Technologies
   13   14   15   16   17   18   19   20   21   22   23