You are on page 1of 4

THE EVOLUTION

OF TRUST
THE FUTURE
OF MONEY

THE ULTIMATE SOCIAL


IMPACT OF BLOCKCHAIN
TECHNOLOGY DEPENDS
ON WHO CONTROLS
OUR DIGITAL IDENTITIES
BY NATA L I E SMOL ENSK I

IN BRIEF

Banks and governments have in many ways failed to broker trust for
the global economy, especially in the past few decades. Ordinary peo­
ple have grown wary of centralized power and are seeking alternatives.

Bitcoin—and blockchain technology in general—allows the brokering


T o participate in today ’s global economy,
ordinary people must accept an asym-
metrical bargain: their lives are trans-
parent to states, banks and corporations, whereas
the behavior and inner workings of the powerful
actors are kept hidden. The boundaries between the
consumer and the citizen have irreversibly blurred.
of trust to be shifted toward machines and away from human inter­ Harvard University social scientist Shoshana Zuboff
mediaries such as bankers. This technology could design exploita­
has called this one-sided, extractive interaction “sur-
tion out of the system instead of punishing it later.
veillance capitalism,” and it is a major structural issue.
Blockchains lend themselves both to human emancipation and to The very institutions whose charter is brokering
an unprecedented degree of surveillance and control. How they end social trust—banks and governments—have in many
up being used depends on how the software handles digital identity. parts of the world spectacularly failed to do so, espe-
cially during the lifetimes of those younger than 35.
The 2008 financial crash and its aftermath gave

38 Scientific American, January 2018

© 2017 Scientific American


shape to a kind of ambient helplessness. Of the legal people even wealthier. In the meantime, two billion
cases that were brought to court, most were settled people are still unbanked, excluded even from a far
at shareholders’ expense rather than resulting in jail from perfect network that in principle facilitates
time for high-ranking bankers, which convinced access to capital. There is no agreement about
many that the wealthy and powerful collude for whether or how these trends should be transformed
their own benefit. The issues run much deeper than to promote greater economic equality and inclusion
the fallout from bad mortgages. An analysis of a without compromising individual autonomy.
2007 database listing 37 million companies and That brings us to a historic moment in which
investors across the world yielded the conclusion mistrust of authority in the forms of power and
that 1 percent of these companies control 40 percent wealth grows against a background of economic life
of the network, and most of the 1 percent are finan- that is inescapably global and mobile. If there’s an
cial institutions. Over the past three decades invest- impulse to retreat from it all in protest, there’s also
ment earnings have become the chief source of eco- an acknowledgment that doing so is a recipe for
nomic growth in most countries, far outpacing economic self-sabotage. These constraints have led
income growth and making the top tier of wealthy technologists around the world to imagine alterna-

January 2018, ScientificAmerican.com 39

© 2017 Scientific American


tives that simultaneously scale trust while making tion that cryptocurrencies are more suited to crimi-
it more intimate and reciprocal. It’s no coincidence nal activity than other types of currency. In fact, it
that the world’s first successful digital currency, Bit- reintroduces the specter of surveillance capitalism.
coin, emerged on the scene in 2009: it represents Interestingly, blockchains have properties that lend
a reaction to this growing desire for transparency, themselves both to human emancipation and to an
access and empowerment. unprecedented degree of surveillance and control.
Bitcoin, of course, is a currency that is transacted Whether they end up being used for the former or
Natalie Smolenski via a blockchain—a new digital infrastructure that the latter depends on how the architecture of the
is a cultural functions as a distributed ledger of transactions, “software stack”—the blockchain protocol and the
anthropologist
who writes and validated according to mathematical consensus application layer—handles digital identity.
speaks about the rather than by humans. It is revolutionizing the pos- When it comes to protocol, it’s important to under-
intersections of sibilities for direct exchange and individual owner- stand that there is more than one way to design a
identity, technology ship, not only of money but of any digital asset. blockchain. Generally, “blockchain” is used to describe
and government. Bitcoin—and blockchains in general—is often a type of system in which a single, universal record
She also leads
referred to as “trustless.” But this isn’t quite accu- of transactions is replicated, although there is no
business develop­
ment for Learning rate. Rather trust has been shifted away from human absolute agreement on a set of necessary character-
Machine, a firm that actors and toward a cryptographic system, with istics. Countless chains have now been introduced,
makes applications material incentives for participating in the network. and they are built to solve different things.
for issuing and In other words, trust is being depersonalized. At Take Ethereum, a public blockchain that aims to
verifying official
first, this may seem like a paradox. Haven’t all forms be a global, distributed computer called the Ethere-
records on the
blockchain using of trust relied on humans to some extent? Through- um Virtual Machine. Its chain stores smart con-
the Blockcerts out history, the momentum of global migration and tracts that are executed when the conditions they
open standard. commerce has driven trust networks to scale from specify are met. Unlike Bitcoin, the users most high-
the small group of people any given person knows ly invested in the network—determined via crypto-
to communities largely made of strangers and ene- currency security deposits—get to collectively vali-
mies. To expand across the earth, feed growing pop- date new blocks. Misbehaving users have their crypto-
ulations, wage wars, build empires and engage in currency automatically confiscated.
knowledge exchange, people have used trust tech- Some blockchains are designed for communities
nologies that evolved out of one another in a more with a higher level of trust among their users. These
or less overlapping sequence: kinship and gift giv- “permissioned” chains generally rely on a central
ing, division of labor, account keeping (the origin authority that grants specific users access to the sys-
of credit and debt), hierarchy, currency, universaliz- tem so they can serve as transaction validators. To
ing religions and, most recently, banking. make sure everyone behaves, permissioned chains
At the beginning of the 21st century, trust is tend to rely more on disciplining by the central
undergoing yet another stage of evolution. The authority rather than automated material incen-
very banks that underwrote modern capitalism by tives. One major example is Ripple, a blockchain
acting as secure brokers of trust have in many ways designed specifically to serve as a settlement net-
become an impediment to its development. In our work for transactions between banks. Similarly, the
current financial system, policy and law tend to dis- Enterprise Ethereum Alliance is made up of nearly
incentivize exploitative practices through punish- 200 corporate members who are building an open-
ment. In the future, blockchains could simply source tool kit so businesses can design their own
design those practices out of the picture.  permissioned versions of the Ethereum blockchain.
Still other blockchainlike initiatives are referred
BUILDING FROM A BLOCKCHAIN to as distributed ledgers because they may lack one
bitcoin’s consensus protocol, which sets out the or all of the underlying features of blockchains.
incentives and requirements that frame participa- They are generally permissioned, with many of
tion in the network, is exceptionally good at main- their transactions also kept private. A major dis-
taining a distributed, open, peer-to-peer system tributed ledger is R3 Corda, developed by a consor-
of governance. Its transactions are public, though tium of banks to facilitate consensus regarding
pseudonymous, and its code is open-source and financial agreements.
maintained by a global network of volunteer core Permissioned blockchains and distributed led-
developers. The Bitcoin blockchain also doesn’t gers arose in part to include some type of identity
store identity data; it uses public/private key pairs, vetting for validators and transactors on the net-
rather than accounts, as addresses. work. (By design, there is no native identity valida-
But blockchain-based transactions are more tion in the Bitcoin blockchain protocol.) The field
traceable than cash, which means that once a key of identity is the terrain on which the emancipatory
pair is tied to a known identity, network analysis or oppressive characteristics of blockchains will be
can, for example, aid police in tracking down crimi- socially realized. The easier it is to tie someone’s
nal actors. This reality runs counter to the assump- transactions to an identity—and the more central-

40 Scientific American, January 2018

© 2017 Scientific American


ized and externally controlled an individual’s digital board: it could simply verify that the voter is regis-
identity becomes—the more the possibilities for tered to participate in that election and record that
abuse multiply. he or she has cast a ballot after that person has done
so—all without correlating the vote to the voter.
PROMISE AND PERIL Projects that minimize the dispersal of so-called
the average person cannot use any blockchain personally identifiable information are still rare,
directly, in the same way that the Internet cannot in part because they are not easy to monetize—
be used directly. Rather the individual uses applica- either in financial currency or in the “currency” that
tions that make use of the underlying blockchain in is personal data. One example is Blockcerts, a series
one way or another. The application layer is where of free reference libraries developed by the M.I.T.

We are habituated by the incentive structures of


surveillance capitalism to believe that giving up
sweeping personal data is necessary to get by in
the world. Blockchain technologies may change that.

untold confusion and often outright bad faith can Media Lab and Learning Machine, where I work.
reign. The history of Bitcoin, for example, is littered Blockcerts allows individuals to hold their digital
with cryptocurrency exchanges and wallet providers assets in a private wallet that is hosted on their own
who left gaping security flaws in their applications, device. The documents issued to a person are not
leading to high-profile hacks and accusations of associated with any identity profile unless the recip-
embezzlement. In the case of the Ethereum network, ient chooses to do so. All the code is open-source, so
vulnerabilities have resulted in the theft or loss of it can be inspected for integrity and used by anyone
millions of dollars in its Ether cryptocurrency, with to build his or her own applications for sending,
virtually no recourse for users. In general, using any storing, sharing and verifying official documents.
application built by a trusted third party to hold This claims-based approach is a step toward what
your blockchain-based digital assets is still a highly some in the digital identity space have called “self-
insecure proposition. sovereign identity,” which means that individuals
This is the crux of blockchain’s catch-22: the pub- have administrative control over their own data.
lic won’t use blockchains without user-friendly Blockchains are indeed a disruptive trust tech-
applications. But user-friendly applications often nology. But if blockchain-based applications are
achieve that ease through centralization, which rep- not designed with a commitment to digital self-sov-
licates the conditions of control that blockchains ereignty, there is nothing, in principle, preventing
sought to circumvent. human beings from being treated as so many
If blockchains are to become widely useful, though, objects in a supply chain, with every movement
some correlation of identity with transactions is nec- and activity recorded, perhaps permanently. Creat-
essary. Perhaps identity will not require a full disclo- ing digital identities whose existence is indepen-
sure of who you are. As some in the Bitcoin commu- dent from governments and corporations is the
nity have argued, the current fixation on identity ver- next grand challenge that blockchains both pose
ification is largely misplaced; generally, what people and could help solve.
want to know is whether a particular claim about you
is true: Are you over 21? Did you really get a Ph.D.
from M.I.T.? Are you a U.S. citizen? We are habituated
MORE TO EXPLORE
by the incentive structures of surveillance capitalism
to believe that giving up sweeping personal data is Debt: The First 5,000 Years. Updated edition. David Graeber. Melville House, 2014.
The Age of Cryptocurrency: How Bitcoin and Digital Money Are Challenging the
necessary to get by in the world. Changing that pre- Global Economic Order. Michael Casey and Paul Vigna. St. Martin’s Press, 2015.
supposition is one of the most radical influences that Big Other: Surveillance Capitalism and the Prospects of an Information Civilization.
blockchain technologies may have. Shoshana Zuboff in Journal of Information Technology, Vol. 30, No. 1, pages 75–89;
Imagine, for instance, a future of digital voting. March 2015.
An election board must be able to correlate the cast- FROM OUR ARCHIVES
ing of a vote to a registered voter so that person’s A Calculus of Risk. Gary Stix; May 1998.
vote is marked as “spent.” But that process doesn’t
s c i e n t if i c a m e r i c a n . c o m /m a g a zi n e /s a
necessarily have to identify the individual to the

January 2018, ScientificAmerican.com 41

© 2017 Scientific American

You might also like