Skip to main content

How Close Are Smart Contracts to Impacting Real-World Law? - CoinDesk

xxx

In general, there were two fundamental challenges that needed to be addressed before smart contracts could be used in the real world. First: How would a smart contract actually control real assets so that it could enforce an agreement?… Second: What computer would be trusted to “execute" those terms in a way that both parties could rely upon?

From How Close Are Smart Contracts to Impacting Real-World Law? - CoinDesk

The emergence of the blockchain as the existence proof of a consensus protocol capable of operating an entirely trestles environment opened up new possibilities for dealing with the second problem, but the first one remains difficult to address. As Gideon Greenspan, who I take very seriously on such matters, has pointed out, the link between the world of the blockchain and the "real" world must be managed by a trusted entity, otherwise the blockchain cannot know that the state of the real world has changed.

Comments

Popular posts from this blog

We could fix mobile security, you know. We don't, but we could

Earlier in the week I blogged about mobile banking security , and I said that in design terms it is best to assume that the internet is in the hands of your enemies. In case you think I was exaggerating… The thieves also provided “free” wireless connections in public places to secretly mine users’ personal information. From Gone in minutes: Chinese cybertheft gangs mine smartphones for bank card data | South China Morning Post Personally, I always use an SSL VPN when connected by wifi (even at home!) but I doubt that most people would ever go to this trouble or take the time to configure a VPN and such like. Anyway, the point is that the internet isn’t secure. And actually SMS isn’t much better, which is why it shouldn’t really be used for securing anything as important as home banking. The report also described how gangs stole mobile security codes – which banks automatically send to card holders’ registered mobile phones to verify online transactions – by using either a Trojan...