Skip to main content

POST Corrupting the blockchain

xxx

"Since then, I’ve thought to myself that anyplace where there is the possibility of fraud and corruption – money laundering, investing in sharia-compliant products, moving funds offshore, giving to charities, paying taxes, managing government funds and more – could be assisted by DLT.  It could provide a fully transparent, tamperproof view of who paid what to whom. "

via Solving state corruption with technology - Chris Skinner's blog

But how? Suppose all of the bank accounts in the UK are on a shared ledger and anyone can look at that ledger to see all of the transactions. Oh dear. Something of a privacy problem - it’s none of my business if Chris has spent his money on… well… you get the point. So clearly a transparent ledger is not practical.

So we’d better encrypt it then. Now you can see that I paid Chris but not how much or what for. But that sounds like no-one’s business but ours, doesn’t it? In which case, he should be using anonymous digital cash like Z-cash or eMoney or Mondex. That’s better. Now no-one can see that Chris and are paying each other. Now I can get on and bribe him to award me a contract. Oh wait, I thought we were against that? My head hurts.

Comments

Popular posts from this blog

We could fix mobile security, you know. We don't, but we could

Earlier in the week I blogged about mobile banking security , and I said that in design terms it is best to assume that the internet is in the hands of your enemies. In case you think I was exaggerating… The thieves also provided “free” wireless connections in public places to secretly mine users’ personal information. From Gone in minutes: Chinese cybertheft gangs mine smartphones for bank card data | South China Morning Post Personally, I always use an SSL VPN when connected by wifi (even at home!) but I doubt that most people would ever go to this trouble or take the time to configure a VPN and such like. Anyway, the point is that the internet isn’t secure. And actually SMS isn’t much better, which is why it shouldn’t really be used for securing anything as important as home banking. The report also described how gangs stole mobile security codes – which banks automatically send to card holders’ registered mobile phones to verify online transactions – by using either a Trojan...