ICYMI on In The Mesh, read the next parts there first.
This article is the second in a four-part series by Matt B (@MattoshiN) and Wassim Alsindi (@parallelind) on the use of Bitcoin and the technology stack built atop it to assist those living under oppressive regimes or in conflict zones, and those seeking to flee them.
The detrimental effects of government-mandated money — and conversely, the benefits of sound money adoption — were discussed in the previous article in this series, as were the properties that make Bitcoin a powerful and permissionless alternative to fiat. In this piece, we’ll focus on the technology that makes the protocol so robust and why that matters in today’s world. It’s wise to first provide a definition for Bitcoin, not an easy task. As a complex ensemble of components giving rise to a series of emergent behaviours and phenomena, the what of Bitcoin appears to have a lot of subjective baggage attached. Bitcoin scribe Nic Carter has tackled some epistemological and ontological perspectives of Bitcoin, as informed by wider phenomenology.
The Bitcoin name refers to several things: the broadcast ‘push’ messaging protocol, the peer-to-peer network of nodes running client software and UTXOs (unspent transaction outputs) or ‘pieces of bitcoin’. The record of transactions between users’ addresses is notarised using a high-assurance data structure — the ‘blockchain’ — which is synchronised across the network’s nodes allowing a ledger to be constructed permissionlessly by anyone who runs the Bitcoin client software. The global state of the transaction history is kept in agreement. The true state of the ledger is maintained by the thermodynamic competition to create blocks (Proof-of-Work, or PoW ‘mining’), ensuring that massive expenditure of computational power and energy would be required for a prospective attacker to rewrite the blockchain and therefore alter Bitcoin’s historical record. Miners are rewarded with bitcoins for winning the race to find candidate blocks and broadcasting them to the network, provided the protocol has been followed and the network reaches agreement on the next block to be added to the chain. Transactions are included in each block, the order of which is determined by a ‘fee market’, with higher priority transactions incentivising miners to include them with above average fees.
From a user’s perspective, Bitcoin is a payment system that allows them to send payments without regard for borders, governments or geographical distance. Once a transaction has been included in a block, it is said to have a single confirmation. With each subsequent confirmation, it becomes harder for an adversary to reverse, alter or censor it. In times of normal network operation, a transaction is considered final and spendable once it has six confirmations — though in reality the finality is probabilistic rather than absolute. In other words, it is extremely unlikely to be reversed, rather than impossible. Though Bitcoin has not experienced large-scale reorganisations of its ledger history (so-called ‘majority’ or ‘51%’ attacks), it is becoming an increasingly common occurrence in smaller PoW networks. As a user, what could be less confidence-inspiring than the prospect of storing your precious value in a fragile network which gets disrupted relatively easy and often? It’s akin to leaving your front door ajar and wondering why things keep getting messed up.
The one-way SHA-256d hash function plays an integral role in the Bitcoin ecosystem (and in the wider field of public-key cryptography), leveraging the asymmetry of ‘guessing’ or ‘brute-forcing’ a private key associated with a public key versus the ease of proving that said public key is associated with the private key. Similarly, blocks are very difficult to ‘guess’ (enter the PoW algorithm), but it’s trivial to prove that one has been found.
In essence, the hash function is a deterministic process which takes a piece of information (of any length) and returns a piece of information of a specific length. Think of such a function as a meat grinder — you can put a cut of fine Kobe beef through one to produce mince, but it is all but impossible to reverse-engineer the original.
Despite ecocentric narratives around “Bitcoin boiling the oceans”, PoW is the most secure, equitable and effective mechanism for the addition of a block that exists today. It’s entirely possible to swap the algorithm for a consortium or single party creating new blocks via some other mechanism, but this would sacrifice the entire value proposition by centralising production and validation. The notion of ‘autonomous entry’ is vital to the decentralisation of Bitcoin, and, by extension, its most attractive characteristics encapsulated by resilience against external control and coercion: permissionlessness (anyone can be part of the network), censorship-resistance (anyone can transact) and immutability (transactions are final). Since its launch in January 2009, the network has enjoyed 99.983% uptime.
Decentralisation isn’t easily reduced to a binary phenomenon, more closely resembling an emergent, complex and multidimensional spectral characteristic. The notion was originally espoused by de Toqueville as an antonym to the centralisation of state power before and after the French Revolution. A number of approaches to characterise decentralisation as a meaningful or even quantifiable metric have been made, with varying insights and approaches. In a given network, you’ll probably want to consider a myriad of different factors such as the technology, the organisation (or lack thereof) of the participants, the data structures that host the historical record and the topology of the network itself. To all intents and purposes, Bitcoin fares quite well with all of these metrics — hashpower centralisation may be an issue, though game theory and “skin in the game” due to sunk costs in equipment outlay would in most circumstances incentivise an actor in possession of a significant amount to act honestly. An example of this was the mining pool GHash.io which breached 50% of network hashrate in 2014, before widespread commotion and redistribution of computational resource. The exodus was so pronounced that the pool ceased to exist shortly afterwards.
Let’s attempt a finer grain perspective of what these concepts embody employing this layered approach. Immutability is an attribute primarily observed at the protocol layer — upon which the monetary layer depends for persistence — ensuring the inability of stakeholders or adversaries to alter the transaction record and thereby balances. Censorship-resistance is also primarily observed at the protocol layer, as valid transactions of any type are not prevented from being broadcast to the P2P network, included in blocks and recorded in the network’s shared ledger.Permissionlessness can be regarded as a related phenomenon on the social layer, where no persons or entities are prevented from broadcasting transactions and being included in the ledger, so that anyone can participate and use the network without prejudice.
Decentralisation itself can be taken to mean different things when considering the various layers in our model. Protocol decentralisation would refer to distribution of nodes fully validating the ledger from it’s genesis and incentives for mining and validation of transactions and/or blocks. Monetary decentralisation can be assessed by studying inequality in the concentration of asset distribution, though this is an imperfect heuristic in cryptocurrencies as an entity may control many public keys, which in turn can generate many addresses. A more pressing issue is the quantity of bitcoin held by centralised exchanges — Coinbase alone custodied at least 5% of all BTC as of late 2018.
Social decentralisation pertains to the decision-making and consensus reaching methods of a network, and whether some subset of stakeholder constituents are able to exert undue degrees of explicit or implicit influence over a network’s outcomes. The “implicit user contract” of Bitcoin has been described recently as a positive feedback loop between the protocol and social layers reinforcing each other, and also as an intersubjective consensus arrived at by a distributed group of users, similar to the game theoretical notion of a focal or “Schelling” point.
With this in mind, the oft-quoted concept of ‘code is law’ which refers to immutability in cryptocurrency networks, typically referring more to preserving the intended use and function of a system and its ledger rather than a blind adherence to a software implementation regardless of flaws or vulnerabilities. For example, a recent critical vulnerability in some versions of the “reference implementation” of Bitcoin’s software client — Bitcoin Core — would have allowed an adversary to crash mining nodes on the network and clandestinely create further supply of bitcoin UTXOs, thereby violating the supply cap. There was little resistance to fixing this as it was deemed to be an obvious software bug in clear contradiction of the implicit but mutually understood ‘rules of Bitcoin’. However a similar issue became extremely contentious in the Ethereum network in 2016 following the catastrophic failure of an investment-focused smart contract suite known as “The DAO”, leading to a network split as actions taken to delete certain balances including some “child DAOs” (that were not ascribed to the attacker) was considered a violation of the network’s immutability and the promise of “unstoppable applications”. This led to the creation of a new network keeping the Ethereum name, and a continuation of the original network’s philosophy known as Ethereum Classic, where a significant minority of the original Ethereum community continued mining, developing and maintaining the network built around the canonical blockchain.
Though the above events were both related to unintended function of network software, the lack of contention with the recent Bitcoin Core vulnerability (CVE) as compared to the Ethereum network fragmentation following the exploitation of The DAO can be rationalised by examining the differences in the two sequences of events. The Bitcoin Core bug affected a wallet implementation, whereas The DAO was a suite of on-chain smart contracts holding around 15% of all ETH supply. Secondly, the Bitcoin Core CVE was responsibly disclosed and promptly patched by most miners (who were the most vulnerable to exploitation) whilst Ethereum was perceived to have handled The DAO situation poorly, despite multiple researchers publically calling for caution and further code auditing prior to launch. Finally, there was significant disagreement over the best way to proceed in light of The DAO’s failure, with a number of solutions proposed. An on-chain “carbon vote” was taken to assess the network stakeholders’ moods, though this was marred by low turnout and large votes by single blocs of whales and insiders.
Bitcoin’s key characteristics — scarcity, decentralisation, immutability, censorship-resistance and permissionlessness — are a result of careful design and development over the past decade and represent some of the most significant achievements in computer science and engineering to date. That being said, much work remains to be done in order to realise the ultimate potential of cryptocurrency as an impenetrable guerilla financial armoury empowering the dispossessed peoples of Earth against authoritarianism and oppression.
Next up at In The Mesh: two more instalments in this series and more on the potential of cryptocurrency to empower those living under authoritarianism.
Wassim Alsindi directs research at independent laboratory Parallel Industries, analysing cryptocurrency networks from data-driven and human perspectives. Find him at www.pllel.com and @parallelind on Twitter.
Matt B is a writer and content strategist in the cryptocurrency space with a particular interest in Bitcoin and privacy technology. He can be reached at www.itsmattbit.ch and @MattoshiN on Twitter.
Images by Kevin Durkin for In The Mesh