Blockchain and the Law
eBook - ePub

Blockchain and the Law

The Rule of Code

Primavera De Filippi, Aaron Wright

Share book
  1. English
  2. ePUB (mobile friendly)
  3. Available on iOS & Android
eBook - ePub

Blockchain and the Law

The Rule of Code

Primavera De Filippi, Aaron Wright

Book details
Book preview
Table of contents
Citations

About This Book

"Blockchains will matter crucially; this book, beautifully and clearly written for a wide audience, powerfully demonstrates how."
—Lawrence Lessig "Attempts to do for blockchain what the likes of Lawrence Lessig and Tim Wu did for the Internet and cyberspace—explain how a new technology will upend the current legal and social order… Blockchain and the Law is not just a theoretical guide. It's also a moral one."
— Fortune Bitcoin has been hailed as an Internet marvel and decried as the preferred transaction vehicle for criminals. It has left nearly everyone without a computer science degree confused: how do you "mine" money from ones and zeros?The answer lies in a technology called blockchain. A general-purpose tool for creating secure, decentralized, peer-to-peer applications, blockchain technology has been compared to the Internet in both form and impact. Blockchains are being used to create "smart contracts, " to expedite payments, to make financial instruments, to organize the exchange of data and information, and to facilitate interactions between humans and machines. But by cutting out the middlemen, they run the risk of undermining governmental authorities' ability to supervise activities in banking, commerce, and the law. As this essential book makes clear, the technology cannot be harnessed productively without new rules and new approaches to legal thinking."If you…don't 'get' crypto, this is the book-length treatment for you."
—Tyler Cowen, Marginal Revolution "De Filippi and Wright stress that because blockchain is essentially autonomous, it is inflexible, which leaves it vulnerable, once it has been set in motion, to the sort of unforeseen consequences that laws and regulations are best able to address."
—James Ryerson, New York Times Book Review

Frequently asked questions

How do I cancel my subscription?
Simply head over to the account section in settings and click on “Cancel Subscription” - it’s as simple as that. After you cancel, your membership will stay active for the remainder of the time you’ve paid for. Learn more here.
Can/how do I download books?
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
What is the difference between the pricing plans?
Both plans give you full access to the library and all of Perlego’s features. The only differences are the price and subscription period: With the annual plan you’ll save around 30% compared to 12 months on the monthly plan.
What is Perlego?
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Do you support text-to-speech?
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Is Blockchain and the Law an online PDF/ePUB?
Yes, you can access Blockchain and the Law by Primavera De Filippi, Aaron Wright in PDF and/or ePUB format, as well as other popular books in Law & Science & Technology Law. We have over one million books available in our catalogue for you to explore.

Information

Year
2018
ISBN
9780674985919

1

The Technology

1

Blockchains, Bitcoin, and Decentralized Computing Platforms

At their core, blockchains are decentralized databases, maintained by a distributed network of computers. They blend together a variety of different technologies—including peer-to-peer networks, public-private key cryptography, and consensus mechanisms—to create a novel type of database. We provide here a short description of how blockchains work, and unpack and contextualize their key technological components.
UNTIL THE BIRTH of the Internet, computers suffered in isolation. They were islands, lacking a way to connect to one another except by using cumbersome cables. That all changed in the late 1950s. With the Soviets successfully launching Sputnik into space, and with fears of the Cold War mounting, researchers at the Rand Corporation began to explore a new computing paradigm—in hopes of developing a system that would be able to withstand a nuclear catastrophe.1 In August 1964, after years of research, Paul Baran, one of the Rand researchers, reported a breakthrough. By relying on a technology called packet switching, Baran was able to send fragments of information from one computer to another and have these fragments reassembled, almost like magic.2
Armed with Baran’s research, the Advanced Research Projects Agency (ARPA) at the U.S. Department of Defense used this new technology to create the first network of computers, ARPAnet, later renamed DARPAnet after “Defense” was added to the beginning of the agency’s name, helping researchers and academics to share files and exchange resources with one another. Over the course of the next several decades, the power of this new network grew, as additional layers of technology—such as TCP/IP (the Transmission Control Program and Internet Protocol) and domain name services (DNSs)—were developed to make it easier to identify computers on the network and ensure that information was being appropriately routed. Computers were no longer isolated.3 They were now being stitched together by using thin layers of code.

Public-Private Key Encryption and Digital Signatures

As DARPAnet was getting off the ground, a second revolution was brewing. New cryptographic algorithms were creating new means for individuals and machines to swap messages, files, and other information in a secure and authenticated way. In 1976, Whitfield Diffie and Marty Hellman, two cryptographers from Stanford University, ingeniously invented the concept of “public-private key cryptography,” solving one of cryptography’s fundamental problems—the need for secure key distribution—while at the same time laying out a theoretical foundation for authenticated digital signatures.4
Before the advent of public-private key encryption, sending private messages was difficult. Encrypted messages traveled over insecure channels, making them vulnerable to interception. To send an encrypted message, the message would need to be scrambled by using a “key” (also known as a cipher), resulting in an impenetrable string of text. When the scrambled message arrived at its intended destination, the recipient would use the same key to decode the encrypted text, revealing the underlying message.5
One significant limitation of these early cryptographic systems was that the key was central to maintaining the confidentiality of any message sent. Parties using these systems had to agree on a key before exchanging messages, or the key somehow had to be communicated to the receiving party. Because of these limitations, keys could easily be compromised. If a third party gained access to a key, they could intercept a communication and decode an encrypted message.6
Public-private key cryptography solved this problem by enabling the sending of encrypted messages without the need for a shared key. Under Diffie and Hellman’s model, both parties would agree on a shared pubic key and each party would generate a unique private key.7 The private key acted as a secret password, which parties did not need to share, whereas the public key served as a reference point that could be freely communicated. By combining the public key with one party’s private key, and then combining the outcome with the private key of the other party, Diffie and Hellman realized that it was possible to generate a shared secret key that could be used to both encrypt and decrypt messages.8
In 1978, shortly after Diffie and Hellman publicly released their groundbreaking work, a team of cryptographers from MIT—Ron Rivest, Adi Shamir, and Len Adleman—built on Diffie and Hellman’s research. They developed an algorithm, known as the RSA algorithm (after the last initials of the developers), in order to create a mathematically linked set of public and private keys generated by multiplying together two large prime numbers. These cryptographers figured out that it was relatively straightforward to multiply two large prime numbers together but exceptionally difficult—even for powerful computers—to calculate which prime numbers were used (a process called prime factorization).9
By taking advantage of this mathematical peculiarity, the RSA algorithm made it possible for people to broadcast their public keys widely, knowing that it would be nearly impossible to uncover the underlying private keys.10 For example, if Alice wanted to send sensitive information to Bob, she could encrypt the information using her own public key and Bob’s public key and publicly publish the encrypted message. With the RSA algorithm, and because of the use of prime factorization, only Bob’s private key would be able to decrypt the message.
The application of public-private key cryptography extended beyond just encrypting messages. As Diffie and Hellman recognized, by building new cryptosystems where “enciphering and deciphering were governed by distinct keys,” public-private key cryptography could underpin secure and authenticated digital signatures that were highly resistant to forgery—thus replacing the need for written signatures that “require paper instruments and contracts.”11
For instance, by using the RSA algorithm, a sending party could attach to a message a “digital signature” generated by combining the message with the sending party’s private key.12 Once sent, the receiving party could use the sending party’s public key to check the authenticity and integrity of the message. By using public-private key encryption and digital signatures, if Alice wanted to send a private message to Bob, she could encrypt the message by using her own private key and Bob’s public key and then sign the message by using her private key. Bob could then use Alice’s public key to verify that the message originated from Alice and had not been altered during transmission. Bob could then safely decrypt the message by using his private key and Alice’s public key.13
Public-private key encryption sparked the imagination of a new generation of academics, mathematicians, and computer scientists, who began to envision new systems that could be constructed using these new cryptographic techniques. By relying on public-private key cryptography and digital signatures, it became theoretically possible to build electronic cash, pseudonymous reputation, and content distribution systems, as well as new forms of digital contracts.14

The Commercial Internet and Peer-to-Peer Networks

In the years following the birth of the Internet and the invention of public-private key cryptography, the computing revolution spread. With the cost of computers rapidly decreasing, these once esoteric machines graduated from the basements of large corporations and government agencies onto our desks and into our homes. After Apple released its iconic personal computer, the Apple II, a wide range of low-cost computers flooded the market. Seemingly overnight, computers seeped into our daily lives.
By the mid-1990s, the Internet had entered a phase of rapid expansion and commercialization. DARPAnet had grown beyond its initial academic setting and, with some updates, was transformed into the modern Internet. Fueled by a constellation of private Internet service providers (ISPs), millions of people across the globe were exploring the contours of “cyberspace,” interacting with new software protocols that enabled people to send electronic messages (via the simple mail transfer protocol, SMTP), transfer files (via the file transfer protocol, FTP), and distribute and link to media hosted on one another’s computers (via the hypertext transfer protocol, HTTP). In a matter of years, the Internet had transformed from a government and academic backwater to a new form of infrastructure—one that, as the New York Times reported, did “for the flow of information … what the transcontinental railroad did for the flow of goods a century ago.”15
At first, Internet services were predominantly structured using a “client-server” model. Servers, owned by early “dot-com” companies, would run one or more computer programs, hosting websites and providing various types of applications, which Internet users could access through their clients. Information generally flowed one way—from a server to a client. Servers could share their resources with clients, but clients often could not share their resources with the server or other clients connected to the same Internet service.16
These early client-server systems were relatively secure but often acted as bottlenecks. Each online service had to maintain servers that were expensive to set up and operate. If a centrally managed server shut down, an entire service could stop working, and, if a server received too many requests from users, it could become overwhelmed, making the service temporarily unavailable.17
By the turn of the twenty-first century, new models for delivering online services had emerged. Instead of relying on a centralized server, parties began experimenting with peer-to-peer (P2P) networks, which relied on a decentralized infrastructure where each participant in the network (typically called a “peer” or a “node”) acted as both a supplier and consumer of informational resources.18 This new model gained mainstream popularity, with the launch of Napster. By running Napster’s software, anyone could download music files from other users (acting as a client) while simultaneously serving music files to others (acting as a server). Using this approach, at its peak, Napster knitted together millions of computers across the globe, creating a massive music library.19
Napster’s popularity, however, was short lived. Underlying the peer-to-peer network was a centrally controlled, continually updated index of all music available on the network. This index directed members to the music files they wanted, acting as a linchpin for the entire network.20
Although necessary for the network’s operation, this centralized index proved to be Napster’s downfall. Following lawsuits against Napster, courts found it liable for secondary copyright infringement, in part because it maintained this index. Napster was forced to manage the files available to peers on the network more carefully, and it scrubbed its index of copyright-protected music. Once this was implemented, the popularity of Napster waned and its users dispersed.21
Following Napster’s defeat, a second generation of peer-to-peer networks emerged, bringing file sharing to an even larger audience. New peer-to-peer networks, such as Gnutella and BitTorrent, enabled people to share information about files located on their personal computers, without the need for centralized indices.22 With Gnutella, users could find files by sending a search request, which was passed along from computer to computer on the network until the requested file was found on another peer’s computer.23 BitTorrent took an alter...

Table of contents