MAPPING CONTROVERSIES: THE BLOCKCHAIN AND CRYPTOCOINS
About the project
Index
Actors
INTRODUCTION: a short description of the Blockchain
First of all, it is important to note the difference between THE blockchain technology, emerging from a series of innovations in cryptography, network and computer science, which eventually led to Satashi Nakamto’s final invention (Nakamoto, 2008); and A blockchain, a technology used by tech organisations as a tool for a decentralized product.
The term “Blockchain” comes from the idea of a design pattern, represented by data blocks of individual transactions linked one to another, creating a chain. Each transaction results in the creation of new blocks in the chain. We could describe the Blockchain architecture as a decentralized technology, functioning with a distributed database shared in a computer network. The database and the code are open-source and transparent, offering an almost infinite potential of development in many sectors, as it is a censorship-free technology (Drainvile, 2012). It is based on three main characteristics:











Essentially, Blockchain is a system for recording transactions with a high degree of security, transparency and pseudonymity, as the recording is public but the users are identified by a code name.
FEATURE 1: Consensus as an alternative to centralized validation
To integrate a transaction in the blockchain, all inherent information has to be implemented in the block. The main issues are the authenticity and veracity of the information, and the interdiction of double spending: a transaction should be unique and official. Historically, society created third parties or mint, trusted by the community, capable of offering such services. These mints would issue money and all transactions would run through their system.

The first revolutionary idea behind the blockchain is the transformation of the community in a trusted third party. By community, we speak here of a fabric of nodes, forming a connected network, or peer-to-peer network, where each node will be a part of this third party. To become this third party, the whole network should be aware of every transaction. Thus, transactions should be publicly announced, recorded in the blockchain and then accessible to the other in the future. The corn stone of this process is the agreement of a majority of nodes on one single history, as well as a proof of this agreement (Nakamoto, 2008). In the blockchain architecture, those nodes are called “miners”. Their job is to solve a complex cryptographic problem, “hash functions”, and to verify the legality of the transaction, by checking in the past blocks if this transaction meets the requirements of the architecture.

More particularly, miners must find a nonce value that, when hashed with additional fields defined in the code of the blockchain, results in a value below a given threshold (Barber, Boyen, Shi & Uzun, 2012). The first miner to accomplish this operation will show a “proof of work” to the rest of the network by including the nonce, plus all the new legitimate transactions in a new block, and broadcast it to the rest of the network (Nakamoto, 2008). The other miners then verify the correctness of the hash computation and if the block is accepted, it will be added in the blockchain and miners will then look for the next valid nonce. The collective validation of this proof of work substitute the work of a benchmark institution.
ARCHITECTURE & FEATURES
Chronology
1. The consensus or “proof of work”, usually emerging after solving a complex mathematical problem, in general a cryptographic hash function, thanks to computational power.

2. The verification or time-stamped information, which proves the veracity of the data, plus offers the feature of a legitimate account book.

3. Double encryption, with a public and a private key provides the possibility to exchange encrypted information without a code. This feature ensures security and transparency.
Two mechanisms assure the structural security of the blockchain technology.

1. The first feature comes from the code itself. Each time that a new block is created and added to the chain, every node gets a copy of the approved chain, and a prove of the holding at a time T is emitted. This feature is implemented in the design of the blockchain and is called the timestamp server: the code of a block is written on the code of the previous block, as each new hash of a block gets a timestamp hammered on the previous timestamp (Nakamoto, 2008). This forms a chain of timestamps where each additional block reinforces the one before it. Therefore, if a modification happens in on of the previous blocks, it will change drastically the whole chain. And as at least 51% of the network have to approve the chain, a fraudulent output is quickly put aside (Reid & Harrigan, 2013). To successfully create a fraudulent block with a double spending transaction, a miner should redo all the calculation of the previous hash and of the block where the original transaction was already recorded. This represents a massive amount of computing power. Plus, to implement the block in the chain, the miner should have at least 51% of the network’s computation power. So each time a new miner comes in the game, the total amount of power increases, protecting all the architecture. So with more and more users, the stronger the blockchain gets.

2. The second one comes from the very essence of blockchain: decentralization. The peer-to-peer network creates one of the strongest way to store unerasable information, as each node gets a copy of the whole blockchain, each time a new block is added to the chain. It is then very difficult to get rid of all the information at once. Furthermore, the idea of stealing data is senseless since every individual will get a copy of the chain when he is part of the network.
FEATURE 2: A decentralised architecture plus a specific coding to offer solid security
FEATURE 3: Double encryption, a source of security for the users and for the network
Blockchain technology is based on encryption, and has a rather interesting innovation in his architecture. The only way to be a peer-to-peer network with a high degree of anonymity is to have a double encryption structure (DuPont, 2014). Therefore, the only way to offer the possibility of consensus decision between every node is to propose a public-key cryptography, to validate transactions between all. Digital signatures or private keys will ensure transactional integrity and non-repudiation, thus offering the anonymity to the users (Reid & Harrigan, 2013). The public can see that someone is sending an amount to someone else, but without information linking the transaction to anyone. As an image, we can compare the public key as the account number, while the private key represents the ownership references. To store the private keys, nodes use digital wallets as well as the digital signatures identifying the cryptocurrency rights or coins (coins) owned by the individual (Reid & Harrigan, 2013). As wallets are digital, someone can pay for services on online websites or stock them privately.

To be more specific technically, the hash function applied for both transactions and block generation is “SHA-256”. Also, the signature algorithm is the elliptic curve digital signature algorithm (ECDSA) (Reid & Harrigan, 2013). These are deployed to prevent a malicious user from breaking the system and gaining control of it. And for transaction to be divisible, like to send a small part of a cryptocurrencie or half of a database, a “shadow” address is automatically created and used to collect back the “change” that results from any trade of data issued by the user. This feature strengthens the privacy of users as there is no direct link between users that could be traced. In general, a new private key is generated from the user pair for each transaction, to keep them from being linked to a common owner. Some linking is still unavoidable with multi-input exchanges, which necessarily reveal that their inputs were owned by the same person. This method of tracking is getting very usual in the counter e-terrorism, as the flow of transactions is recorded since the beginning. The risk is that if the holder of a key is revealed through double crossed information (geographical profiling and internet activity spying can be used to find an owner), linking could expose other transactions that belonged to the same owner.
FEATURE 4: Reward as an incentive for a healthy network and the engine for autonomy
The only recipe to get a healthy peer-to-peer network is to have an active community around it: a lot of users and transactions. To overcome this, one of the best ways is to give incentives to users to take an active part in the system. In the blockchain world, the solution is to offer electronic coins to miners when they successfully mine a block, and let them set a price on transaction fees. If the output value of a transaction is less than its input value, the difference is a transaction fee that is added to the incentive value of the block containing the transaction. This also provides a way to initially distribute coins into circulation, since there is no central authority to issue them. We can do an analogy with gold miners expanding the total amount of gold in the market. To have a steady addition of new tokens, most of blockchain technologies set a limited time to mine a block. For instance, in the bitcoin architecture, it happens every 10 minutes’, which means that a miner has only 10 minutes to run his script to find the right nonce value. If he succeeds and his block gets to be approved by the majority, he receives an award of 12.5 bitcoins (in November 2016)(Drainvile, 2012). This reward decreases with time: it started from 50 bitcoins per bloc, and goes down every four years. He also realises the transactions listed in his repertory and get paid for those transactions. The other miners will try to mine the next block, as will do the successful miner. The only expanse in this process is CPU time calculated in hash/sec and electricity (Drainvile, 2012). So miner will strive to have the most important CPU power to mine quicker than the others. As technology becomes better and better, the code of the blockchain is updated as well: to keep the 10 minutes’ cap in order, the hash function get more complex over the time. So in the end, Bitcoin makes sure that new coins will be minted at a fixed rate, that is, the larger the Bitcoin community and the total computational resource devoted to coin a generation, the more difficult the computational puzzle becomes.

Since there are many nodes working in the network as miners, it is possible that two blocks are created almost simultaneously, thus creating a fork in the chain. The architecture is created so the majority of nodes focus on the longest chain, which will be by design the most complex one. Blocks that were not logged to the longest chain are dropped, and the transactions inside them are put back in the miners’ memory pool (Drainvile, 2012).

To reach a stable system, not submitted to inflation or deflation issues, the original idea of bitcoin was to set a fixed number of coins to be minted: 21 million bitcoins will at the end be in circulation (Buchholz, Delaney, Warren & Parker, 2012). Once this number is reached, the incentive can transition entirely too transaction fees and be completely inflation free. But as the system is based on the low cost of transaction, the main incentive for miners comes from the coin rewards. This is one of the main issues of the bitcoin’s future life.

All this process creates an incentive for miners to stay honest. But if an attacker is able to come up with enough CPU power than all the honest nodes, we will face two decisions: use his power to mint new blocks and get coins, or create a malicious chain approved by the majority. So the architecture is here central for nodes to play by the rules: the incentive has to more profitable than stealing. For the moment, it has been very difficult to for miners to pass by the system, but we can observe big consortium of miners who could be in theory capable of such practice.
FEATURE 5: Low costs in transactions, high velocity and the option for “Smart Contracts” and “smart-property”: a bright future for Blockchain
The success of blockchain, aside the points stressed before, resides on the future applications. The bitcoin community was surly the first step of this new technology. As blockchain is digital and introduces the important notion of programmable instruments, one of the core ideas to research are the smart contract that can be implemented in the architecture. These are rules embedded with a contract that can automatically trigger based on certain conditions being fulfilled. When we say automatically, this means that a computer program would a run a series of “If this, then that” verification, which leads to the emotion of electronic coins if the contract terms are full field. This is the main innovation as in the past, those contracts needed a trusted third party to issue the money. With secure and automatic money transfers, the expansive work of a lawyer is not needed any more. Plus, the contract is impregnable after its implementation in the chain, but still retrievable for anyone in possession of the right key. This can be revolutionary in infinite number of sectors, going from the music industry to social security.

The other point that is not stressed enough is that in addition to the highest levels of security, the blockchain also enables a high velocity of transactions. Without the need of third parties, two agents could exchange money or properties given certain conditions, checked by a program linked to an infinite number of sensors, smart objects or even bionic technologies, which would finally conduct the transaction in real time with the highest amount of security and reliability. This could eventually lead to smart-property technology, another way to exchange commodities: with a geolocated box, a delivery system could implement automatic payment when the shipment is done in the right conditions, thanks to a set of sensors to ensure the product’s quality.

To push the innovation spirit even further, the use of blockchain in Decentralized Autonomous Organisations could at least offer the security, transparency and fluidity of an “ideal” organisation. By setting all the smart contracts which would build the whole framework (hierarchy, membership, retribution legal issues, insurance, …), a company could be managed by a decentralized and reliable program, automatically. Concerns like fraud, corruption, embezzlement, social pressure or inequality would disappear. The cost in infrastructure and operations would be near to zero, thus making a service almost free of charge. Plus, retribution could be distributed in goods or services, like energy.
These innovations are based on the blockchain infrastructure, and illustrate with strength a paradigm developed by Lawrence Lessig in 1999 (Lessig, 2009):

“This code (…) sets the terms on which life in cyberspace is experienced. […] It affects who sees what, or what is monitored.”

This assertion could be summarized as followed: “the code is law” (Musiani, 2012). This is central to the idea of distributed technologies, where the set of the conditions is crucial, as is the continuity and inalteration of those conditions in time: thanks to blockchain technologies, the conditions are almost inviolable but are still accessible to anyone.
REFERENCES
CREDITS:
Hugo Maurer

SOURCES:
Barber, S., Boyen, X., Shi, E., & Uzun, E. (2012, February). Bitter to better—how to make bitcoin a better currency. In International Conference on Financial Cryptography and Data Security (pp. 399-414). Springer Berlin Heidelberg.

Bartlett, J (2016, September 6) Imogen Heap: saviour of the music industry?, The Guardian, retrieved from https://www.theguardian.com/music/2015/sep/06/imogen-heap-saviour-of-music-industry

Buchholz, M., Delaney, J., Warren, J., & Parker, J. (2012). Bits and Bets, Information, Price Volatility, and Demand for Bitcoin. Economics, 312.

Drainvile, D. (2012). An analysis of the Bitcoin electronic cash system.

DuPont, Q. (2014). The politics of cryptography: Bitcoin and the ordering machines. Journal of Peer Production, 1(4).

Lessig, L. (2009). Code: And other laws of cyberspace. ReadHowYouWant.com.

Musiani, F. (2012). Caring about the plumbing: On the importance of architectures in social studies of (peer-to-peer) technology. Journal of Peer Production, 1(online), 8-p.

Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system.

Reid, F., & Harrigan, M. (2013). An analysis of anonymity in the bitcoin system. In Security and privacy in social networks (pp. 197-223). Springer New York.

U Change (2016, January) Comprendre la Blockchain, Livre Blanc http://www.uchange.co/

Vamsi Talks Tech (Blog) (2016, January 28) The Architecture of Blockchain http://www.vamsitalkstech.com/?cat=2

Bartlett, J (2016, September 6) Imogen Heap: saviour of the music industry?, The Guardian, retrieved from https://www.theguardian.com/music/2015/sep/06/imogen-heap-saviour-of-music-industry
# CONSENSUS
# CRYPTOGRAPHY
# ALTCOINS
# FIATCURRENCY
# APPLICATIONS
# CONSENSUS