Skip to content

Public Data Principle

Eric Voskuil edited this page Dec 9, 2017 · 54 revisions

It follows from the risk sharing principle that system security depends upon covert mining and trade. A coin exists as a mutually-beneficial market between miners and merchants for the confirmation of transactions within blocks in exchange for fees.

The necessarily covert activities are listed by role:

Miner

  1. obtain blocks [to build upon]
  2. obtain unconfirmed transactions [to earn fees from]
  3. create and distribute blocks [to cause others to build upon]
  4. receive payment for confirmations [to finance operations]

Merchant

  1. obtain blocks [to validate customer payment]
  2. obtain unconfirmed transactions (optional) [to anticipate payments and fees]
  3. create and distribute transactions [to obtain customer payment]
  4. make payment for confirmations [to compensate confirmation]

If blocks cannot be obtained anonymously the system is insecure. The inability to obtain the strongest blocks available to other people is a network partition that implies localized insecurity. However neither anonymity, nor its opposite identity, can ever ensure one sees the strongest branch at any given time. In other words any attempt to mitigate partitioning with the introduction of identity is a false choice.

It is not essential that all miners or merchants see all transactions at any given time. However broad visibility is preferable as it produces the most robust competition for fees and best leading information. In other words, a market where every participant sees all of the transactions all of the time is a perfect market. Asking the network for specific transactions, as opposed to all or summary information about all, is a source of taint and must be avoided in the interest of security as well.

Creation of blocks and transactions never exposes identity, however public distribution of either is the primary source of taint. To the extent that miners openly self-identify, they are doing so in a low-threat environment and are not contributing to system security. Avoiding taint when disseminating blocks and transactions requires use of an anonymous connection to a community server. This ensures the distribution network never has access to identifying information.

It is essential to understand that proof of work exists to preserve anonymity of miners. There is no signature associated with mining and the presumption is that energy is ubiquitous. Similarly, the ability to pay anonymously for confirmation is the reason for fee inclusion within transactions. It is sufficient to pay a miner directly (off chain) for confirmation, however this exposes the merchant and miner to each other, and makes it more difficult to estimate fees anonymously.

Fundamentally the reason for validation is so that the data can remain both anonymous and verifiable. Legacy financial systems rely on either trust in a (cryptographically-secured) network connection or trust in a (cryptographically-verified) signature on transmitted data. This is the essence of trust-based systems. Some authorities have secrets that others use to verify that authority. Bitcoin is novel in that the data itself can be validated with no identity, and therefore no possibility of authority, in the system.

Libbitcoin Menu

Clone this wiki locally