Slide 1

Slide 1 text

BLOCKCHAIN Insane in the Tony Arcieri · DISCON · August 4th, 2018

Slide 2

Slide 2 text

With apologies to Cypress Hill...

Slide 3

Slide 3 text

iqlusion https://www.iqlusion.io

Slide 4

Slide 4 text

No content

Slide 5

Slide 5 text

No content

Slide 6

Slide 6 text

No content

Slide 7

Slide 7 text

No content

Slide 8

Slide 8 text

No content

Slide 9

Slide 9 text

Rejection

Slide 10

Slide 10 text

That which you can be paid for That which you love That which you are good at That which the world needs Passion Mission Profession Vocation Religion

Slide 11

Slide 11 text

me Rejection That which you can be paid for That which you love That which you are good at That which the world needs Passion Mission Profession Vocation Religion

Slide 12

Slide 12 text

Insane in the BLOCKCHAIN •Decentralization •Delusions of Grandeur •Bitcoin Maximalism •Lightning •Economics •Scams •Governance •Ethics

Slide 13

Slide 13 text

Insane in the BLOCKCHAIN Decentralization

Slide 14

Slide 14 text

What is decentralization?

Slide 15

Slide 15 text

https://blog.maidsafe.net/2015/12/04/evolving-terminology/ me

Slide 16

Slide 16 text

No content

Slide 17

Slide 17 text

https://www.whitehouse.gov/sites/default/files/microsites/ostp/PCAST/10.40%20D%20Grant.pdf

Slide 18

Slide 18 text

https://twitter.com/blkchninstitute/status/776561813148270592

Slide 19

Slide 19 text

Paul Baran

Slide 20

Slide 20 text

No content

Slide 21

Slide 21 text

Network Topologies

Slide 22

Slide 22 text

No content

Slide 23

Slide 23 text

“decentralized”

Slide 24

Slide 24 text

Slide 25

Slide 25 text

No content

Slide 26

Slide 26 text

“decentralized”

Slide 27

Slide 27 text

Federation an organization or group within which smaller divisions have some degree of internal autonomy BFT Consensus distributed agreement among nodes which is dependable in the event of network failures or malicious manipulation

Slide 28

Slide 28 text

Leslie Lamport Barbara Liskov Paxos PBFT

Slide 29

Slide 29 text

No content

Slide 30

Slide 30 text

Isn't Bitcoin BFT?

Slide 31

Slide 31 text

No content

Slide 32

Slide 32 text

The Bitcoin Backbone Protocol: Analysis and Applications∗ Juan A. Garay Yahoo Research garay@yahoo-inc.com Aggelos Kiayias†‡ University of Edinburgh, IOHK akiayias@inf.ed.ac.uk Nikos Leonardos†§ National and Kapodistrian University of Athens. nikos.leonardos@gmail.com June 23, 2017 Abstract Bitcoin is the first and most popular decentralized cryptocurrency to date. In this work, we extract and analyze the core of the Bitcoin protocol, which we term the Bitcoin backbone, and prove two of its fundamental properties which we call common prefix and chain quality in the static setting where the number of players remains fixed. Our proofs hinge on appropriate and novel assumptions on the “hashing power” of the adversary relative to network synchronicity; we show our results to be tight under high synchronization. Next, we propose and analyze applications that can be built “on top” of the backbone pro- tocol, specifically focusing on Byzantine agreement (BA) and on the notion of a public trans- action ledger. Regarding BA, we observe that Nakamoto’s suggestion falls short of solving it, and present a simple alternative which works assuming that the adversary’s hashing power is bounded by 1/3. The public transaction ledger captures the essence of Bitcoin’s operation as a cryptocurrency, in the sense that it guarantees the liveness and persistence of committed transactions. Based on this notion we describe and analyze the Bitcoin system as well as a more elaborate BA protocol, proving them secure assuming high network synchronicity and that the adversary’s hashing power is strictly less than 1/2, while the adversarial bound needed for security decreases as the network desynchronizes. Finally, we show that our analysis of the Bitcoin backbone protocol for synchronous networks extends with relative ease to the recently considered “partially synchronous” model, where there is an upper bound in the delay of messages that is unknown to the honest parties. 1 Introduction Bitcoin, introduced in [Nak08a], is a decentralized payment system that is based on maintaining a public transaction ledger in a distributed manner. The ledger is maintained by anonymous par- ticipants (“players”) called miners, executing a protocol that maintains and extends a distributed data structure called the blockchain. The protocol requires from miners to solve a “proof of work” ∗An abridged version of this paper appears in Proc. Eurocrypt 2015. †Research partly supported by ERC project CODAMODA, # 259152. ‡Work partly done while at the National and Kapodistrian University of Athens §Work partly done while at LIAFA, Université Paris Diderot–Paris 7. 1

Slide 33

Slide 33 text

Abstract Bitcoin is the first and most popular decentralized cryptocurrency to date. In this work, we extract and analyze the core of the Bitcoin protocol, which we term the Bitcoin backbone, and prove two of its fundamental properties which we call common prefix and chain quality in the static setting where the number of players remains fixed. Our proofs hinge on appropriate and novel assumptions on the “hashing power” of the adversary relative to network synchronicity; we show our results to be tight under high synchronization. Next, we propose and analyze applications that can be built “on top” of the backbone pro- tocol, specifically focusing on Byzantine agreement (BA) and on the notion of a public trans- action ledger. Regarding BA, we observe that Nakamoto’s suggestion falls short of solving it, and present a simple alternative which works assuming that the adversary’s hashing power is bounded by 1/3. The public transaction ledger captures the essence of Bitcoin’s operation as a cryptocurrency, in the sense that it guarantees the liveness and persistence of committed transactions. Based on this notion we describe and analyze the Bitcoin system as well as a more elaborate BA protocol, proving them secure assuming high network synchronicity and that the adversary’s hashing power is strictly less than 1/2, while the adversarial bound needed for security decreases as the network desynchronizes. Finally, we show that our analysis of the Bitcoin backbone protocol for synchronous networks extends with relative ease to the recently considered “partially synchronous” model, where there is an upper bound in the delay of messages that is unknown to the honest parties. 1 Introduction Bitcoin, introduced in [Nak08a], is a decentralized payment system that is based on maintaining a public transaction ledger in a distributed manner. The ledger is maintained by anonymous par- ticipants (“players”) called miners, executing a protocol that maintains and extends a distributed

Slide 34

Slide 34 text

Is Bitcoin decentralized?

Slide 35

Slide 35 text

No content

Slide 36

Slide 36 text

No content

Slide 37

Slide 37 text

No content

Slide 38

Slide 38 text

No content

Slide 39

Slide 39 text

Is this bad?

Slide 40

Slide 40 text

Insane in the BLOCKCHAIN Delusions of Grandeur

Slide 41

Slide 41 text

This is gonna be BIG

Slide 42

Slide 42 text

How big?

Slide 43

Slide 43 text

Bigger than the Internet?

Slide 44

Slide 44 text

No content

Slide 45

Slide 45 text

Bigger than brokerages?

Slide 46

Slide 46 text

No content

Slide 47

Slide 47 text

Bigger than national economies?

Slide 48

Slide 48 text

No content

Slide 49

Slide 49 text

Replace the Financial System!

Slide 50

Slide 50 text

Markets by the Metrics

Slide 51

Slide 51 text

http://money.visualcapitalist.com/worlds-money-markets-one-visualization-2017/ Market Size Visualization Cryptocurrency BTC ETH Other Each square this size is worth $100B

Slide 52

Slide 52 text

http://money.visualcapitalist.com/worlds-money-markets-one-visualization-2017/ Market Size Visualization Gold Jewelry Private Investment Central Banks & IMF Other (e.g. Industrial) Each square this size is worth $100B

Slide 53

Slide 53 text

http://money.visualcapitalist.com/worlds-money-markets-one-visualization-2017/ Market Size Visualization Global Currencies Each square this size is worth $100B

Slide 54

Slide 54 text

http://money.visualcapitalist.com/worlds-money-markets-one-visualization-2017/ Market Size Visualization US Stock Market Each square this size is worth $100B

Slide 55

Slide 55 text

http://money.visualcapitalist.com/worlds-money-markets-one-visualization-2017/ Market Size Visualization World Stock Market Each square this size is worth $100B

Slide 56

Slide 56 text

Market Size Visualization Derivatives Market (would fill several slides)

Slide 57

Slide 57 text

We're not there yet...

Slide 58

Slide 58 text

Dream Big Stay Humble

Slide 59

Slide 59 text

Insane in the BLOCKCHAIN Bitcoin Maximalism

Slide 60

Slide 60 text

"Bitcoin, not blockchain"

Slide 61

Slide 61 text

No content

Slide 62

Slide 62 text

I've got a metaphor for that...

Slide 63

Slide 63 text

No content

Slide 64

Slide 64 text

No content

Slide 65

Slide 65 text

No content

Slide 66

Slide 66 text

Bitcoin isn't irreplacable

Slide 67

Slide 67 text

Bitcoin is very, very, very, very slow

Slide 68

Slide 68 text

No content

Slide 69

Slide 69 text

No content

Slide 70

Slide 70 text

“The peak number of transactions per second so far this year reached 325,000.”

Slide 71

Slide 71 text

• AliPay: 325,000 transactions / sec • VisaNet: 24,000 transactions / sec • Bitcoin: 4 transactions / sec

Slide 72

Slide 72 text

No content

Slide 73

Slide 73 text

Latency

Slide 74

Slide 74 text

BUT WAIT...

Slide 75

Slide 75 text

Insane in the BLOCKCHAIN ⚡Lightning⚡

Slide 76

Slide 76 text

No content

Slide 77

Slide 77 text

No content

Slide 78

Slide 78 text

No content

Slide 79

Slide 79 text

No content

Slide 80

Slide 80 text

No content

Slide 81

Slide 81 text

No content

Slide 82

Slide 82 text

No content

Slide 83

Slide 83 text

No content

Slide 84

Slide 84 text

No content

Slide 85

Slide 85 text

No content

Slide 86

Slide 86 text

No content

Slide 87

Slide 87 text

No content

Slide 88

Slide 88 text

20 18 16 14 12 10 8 6 4 2 0 Parallel portion Number of processors 50% 75% 90% 95% Speedup 1 2 4 8 16 32 64 128 256 512 1024 2048 4096 8192 16384 32768 65536 Amdahl's Law

Slide 89

Slide 89 text

No content

Slide 90

Slide 90 text

Insane in the BLOCKCHAIN Economics

Slide 91

Slide 91 text

John Maynard Keynes Friedrich A. von Hayek

Slide 92

Slide 92 text

No content

Slide 93

Slide 93 text

No content

Slide 94

Slide 94 text

No content

Slide 95

Slide 95 text

“I agree with Milton Friedman that once the Crash had occurred, the Federal Reserve System pursued a silly deflationary policy. I am not only against inflation but I am also against deflation. So, once again, a badly programmed monetary policy prolonged the depression.” —FRIEDRICH A. VON HAYEK

Slide 96

Slide 96 text

“I would no longer maintain, as I did in the early '30s, that [...] a short period of deflation might be desirable. Today I believe that deflation has no recognizable function whatsoever, and that there is no justification for supporting or permitting a process of deflation.” —FRIEDRICH A. VON HAYEK

Slide 97

Slide 97 text

Equilibrium

Slide 98

Slide 98 text

What economic philosophy best fits Bitcoin?

Slide 99

Slide 99 text

$ Anarcho-capitalism

Slide 100

Slide 100 text

Insane in the BLOCKCHAIN Scams

Slide 101

Slide 101 text

No content

Slide 102

Slide 102 text

No content

Slide 103

Slide 103 text

No content

Slide 104

Slide 104 text

"oh boy is that future shady"

Slide 105

Slide 105 text

AriseBank

Slide 106

Slide 106 text

https://www.youtube.com/watch?v=5KXHgh2rTTw

Slide 107

Slide 107 text

No content

Slide 108

Slide 108 text

Insane in the BLOCKCHAIN

Slide 109

Slide 109 text

• TERNARY COMPUTING!!!#$#$!$!#%%!!!$!!!$@!!!!!!#$!#!!! • Centralized in the Coordinator ("COO") • Don't worry, we'll fix it later • "Designed" a trivially collidable has function (Curl-P) • Intentionally! Because DRM!

Slide 110

Slide 110 text

Two Tangles?

Slide 111

Slide 111 text

• The community should almost never engage in technical arguments.This allows the FUDsters, who may be more technically proficient than community members, to weave deception and misdirection through their otherwise technically proficient arguments. By engaging with them, you actually legitimize their assertions, in the eyes of the Audience, to a certain extent. https://medium.com/@dan_47238/the-guide-to-effectively-fighting-fud-417d2340678a

Slide 112

Slide 112 text

• Hit FUDsters where it hurts: Address their motivations and hit them where it hurts. If they are FUDding a technically superior project, then the likelihood is that their project is technically inferior for obvious reasons. Hit the project in social media. Are they employed by an organization that doesn’t want to be associated with shady actions? Call out that employer publicly. Is the person trying to build a reputation? Mock them and their reputation in front of their followers. Take a pound of flesh. https://medium.com/@dan_47238/the-guide-to-effectively-fighting-fud-417d2340678a

Slide 113

Slide 113 text

Insane in the BLOCKCHAIN Tether

Slide 114

Slide 114 text

= $

Slide 115

Slide 115 text

No content

Slide 116

Slide 116 text

No content

Slide 117

Slide 117 text

No content

Slide 118

Slide 118 text

Legit Fiat On-Ramp Tether provided a liquidity vehicle which allowed cryptocurrencies to be traded on exchanges that otherwise couldn't deal in USD SCAAAAAM!!!! Tether was printed out of thin air with the goal of using it to manipulate the price of Bitcoin and other cryptocurrencies

Slide 119

Slide 119 text

No content

Slide 120

Slide 120 text

Is Bitcoin Really Un-Tethered? JOHN M. GRIFFIN and AMIN SHAMS* June 13, 2018 Abstract This paper investigates whether Tether, a digital currency pegged to U.S. dollars, influences Bitcoin and other cryptocurrency prices during the recent boom. Using algorithms to analyze the blockchain data, we find that purchases with Tether are timed following market downturns and result in sizable increases in Bitcoin prices. Less than 1% of hours with such heavy Tether transactions are associated with 50% of the meteoric rise in Bitcoin and 64% of other top cryp- tocurrencies. The flow clusters below round prices, induces asymmetric autocorrelations in Bitcoin, and suggests incomplete Tether backing before month-ends. These patterns cannot be explained by investor demand proxies but are most consistent with the supply-based hypothesis where Tether is used to provide price support and manipulate cryptocurrency prices.

Slide 121

Slide 121 text

Insane in the BLOCKCHAIN ⚖Governance

Slide 122

Slide 122 text

Anniversaries! • 2 years (June 18th): DAO Hack - 3.6M ETH • 1 year (July 19th): Parity Wallet Hack - 150K ETH

Slide 123

Slide 123 text

No content

Slide 124

Slide 124 text

No content

Slide 125

Slide 125 text

No content

Slide 126

Slide 126 text

Insane in the BLOCKCHAIN Ethics

Slide 127

Slide 127 text

"Your scientists were so preoccupied with whether they could that they didn't stop to think if they should." -Dr. Jeff Goldblum

Slide 128

Slide 128 text

Top Ethereum dApps

Slide 129

Slide 129 text

Sex, drugs, and bitcoin: How much illegal activity is financed through cryptocurrencies? * Sean Foley a, Jonathan R. Karlsen b, Tālis J. Putniņš b, c a University of Sydney b University of Technology Sydney c Stockholm School of Economics in Riga January, 2018 Abstract Cryptocurrencies are among the largest unregulated markets in the world. We find that approximately one-quarter of bitcoin users and one-half of bitcoin transactions are associated with illegal activity. Around $72 billion of illegal activity per year involves bitcoin, which is close to the scale of the US and European markets for illegal drugs. The illegal share of bitcoin activity declines with mainstream interest in bitcoin and with the emergence of more opaque cryptocurrencies. The techniques developed in this paper have applications in cryptocurrency surveillance. Our findings suggest that cryptocurrencies are transforming the way black markets operate by enabling “black e-commerce”. JEL classification: G18, O31, O32, O33 Keywords: blockchain, bitcoin, detection controlled estimation, illegal trade

Slide 130

Slide 130 text

No content

Slide 131

Slide 131 text

The Moral Character of Cryptographic Work? Phillip Rogaway Department of Computer Science University of California, Davis, USA rogaway@cs.ucdavis.edu December 2015 (minor revisions March 2016) Abstract. Cryptography rearranges power: it configures who can do what, from what. This makes cryptography an inherently political tool, and it confers on the field an intrinsically moral dimension. The Snowden revelations motivate a reassessment of the political and moral positioning of cryptography. They lead one to ask if our inability to e↵ectively address mass surveillance constitutes a failure of our field. I believe that it does. I call for a community-wide e↵ort to develop more e↵ective means to resist mass surveillance. I plead for a reinvention of our disciplinary culture to attend not only to puzzles and math, but, also, to the societal implications of our work. Keywords: cryptography · ethics · mass surveillance · privacy · Snowden · social responsibility Preamble. Most academic cryptographers seem to think that our field is a fun,

Slide 132

Slide 132 text

address mass surveillance constitutes a failure of our field. I believe that it does. I call for a community-wide e↵ort to develop more e↵ective means to resist mass surveillance. I plead for a reinvention of our disciplinary culture to attend not only to puzzles and math, but, also, to the societal implications of our work. Keywords: cryptography · ethics · mass surveillance · privacy · Snowden · social responsibility Preamble. Most academic cryptographers seem to think that our field is a fun, deep, and politically neutral game—a set of puzzles involving communicating parties and notional adversaries. This vision of who we are animates a field whose work is intellectually impressive and rapidly produced, but also quite inbred and divorced from real-world concerns. Is this what cryptography should be like? Is it how we should expend the bulk of our intellectual capital? For me, these questions came to a head with the Snowden disclosures of 2013. If cryptography’s most basic aim is to enable secure communications, how could it not be a colossal failure of our field when ordinary people lack even a modicum of communication privacy when interacting electronically? Yet I soon realized that most cryptographers didn’t see it this way. Most seemed to feel that the disclosures didn’t even implicate us cryptographers. I think that they do. So I want to talk about the moral obligations of cryp- tographers, and my community as a whole. This is not a topic cryptographers

Slide 133

Slide 133 text

• How do we stop scammers from using cryptocurrency to defraud people? • How can we decrease the number of criminals using cryptocurrencies? • How can we increase the legitimate uses of cryptocurrencies? • How can governance bodies of cryptocurrencies work with national governments to find and stop criminal users of cryptocurrencies?

Slide 134

Slide 134 text

Insane in the BLOCKCHAIN Thanks! @bascule @iqlusioninc tonyarcieri.com