Next Generation Voting Nikolas Roby, Patrick Gill, Michael Williams Un

Total Page:16

File Type:pdf, Size:1020Kb

Next Generation Voting Nikolas Roby, Patrick Gill, Michael Williams Un Running head: ROCK THE BLOCKCHAIN 1 Rock the Blockchain: Next Generation Voting Nikolas Roby, Patrick Gill, Michael Williams University of Maryland University College (UMUC) Author Note Thanks to our UMUC Faculty mentor, Jesse Varsalone Thanks to The Economist and Kaspersky Lab for providing the case study ROCK THE BLOCKCHAIN 2 Table of Contents Author Note .................................................................................................................................... 1 Abstract ........................................................................................................................................... 3 Overview ......................................................................................................................................... 4 The Problem ................................................................................................................................ 4 Overview of the Setup Steps ........................................................................................................... 6 Establishing Polling Stations on the Blockchain ........................................................................ 6 Issuing a Voting Wallet to Voters ............................................................................................... 7 Setting up the Election ................................................................................................................ 8 The Voting Process ......................................................................................................................... 9 Voting Under Duress ................................................................................................................ 11 Undecideds ................................................................................................................................ 12 Availability of Interim Results.................................................................................................. 12 Voting Aftermath .......................................................................................................................... 14 Vote Traceability ...................................................................................................................... 14 Conclusion .................................................................................................................................... 16 References ..................................................................................................................................... 17 ROCK THE BLOCKCHAIN 3 Abstract Current voting systems used in today’s election systems contain many flaws. These flaws stem from the ability of both the users and the monitors of the system being able to inject additional votes. These votes land in the system through a variety of different approaches, but the end goal is for the person they want elected to win. Due to these issues, the citizens of countries across the globe need and want a system they can trust and rely on. A trusted election system would grant those people the ability to be heard while feeling like their voice was loud within the many. Within this paper the writers will discuss a new system, and how to implement it with the use of blockchains. Keywords: Blockchain, Voting, Smart Contract, Sidechain, Etherium, Bitcoin ROCK THE BLOCKCHAIN 4 Overview The Problem With the current systems of voting, there are flaws that are core to the design of the electoral system. Voters go to a polling place, present an ID, and are issued a card to vote. There is a possibility that someone could cast multiple votes by going to multiple locations, or by voting for deceased voters. The biggest problem with the current generation of voting system is the lack of trust in the election process. The voting population needs to be able to trust the system, the processes, and understand that their voice is not lost. The people need to feel heard, counted and be able to verify their voice. Finally, the citizens need to be able to trust the counting process, and without bias. The next generation voting system, how would that look? The system would need to start from a foundation of trust. Paper voting is not preferred because of the human aspect of injecting additional tallies, but it does provide a trail. Recent elections in Russia have possibly shown corruption that can occur with the addition of the human element. Digital voting, however, is essentially new but needs to be built around a trust model. With voting people expect the process to be anonymous, but individuals should be able to verify the vote. Votes should be impossible to tamper with, nor, should the system note be able to be flooded with illegitimate votes. All vote counting would be performed in a publicly observable way. With the essential design of a modern voting system, the core tenet would be to remove all need for “trust,” and place strong emphasis on open verification of the process and the votes. Several years ago, a similar problem was addressed with digital currency using a concept called the blockchain. ROCK THE BLOCKCHAIN 5 The blockchain, at its essential level, is a distributed ledger of groups of transactions. Each group of transactions is hashed together, along with a hash of the previous block, and anybody can have a copy of the entire blockchain (Nakamoto, 2008). This means that all transactions can be traced, and false transactions are dropped because they don't match what other blockchain users’ copies indicate. For digital voting using a blockchain, it could record ID for both voter, person voting for, and time. Everybody can get a copy of the blockchain and verify the votes cast! A critical part is the voter IDs are not an actual name, but a random “wallet” ID, not reversible to an actual voter’s identity. With a blockchain, each “block” in the blockchain is a set of transactions that are hashed together, and the blockchain miners are essentially trying to find a hash with a number of leading zeros, by manipulating a nonce. Eventually one of the miners gets a block and it is called the proof of work, which is incorporated into each block in the blockchain. If someone manipulates the blockchain, by trying to change the amount of the transaction, it would invalidate the block, as well as all subsequent blocks. This part of which makes verification of the blockchain straightforward. ROCK THE BLOCKCHAIN 6 Figure 1 - Proof of work on the blockchain. Another interesting property of using the blockchain is the concept of a smart contract. A smart contract is a set of rules attached to a transaction. If the rules are not matched, then the transaction is not completed. These rules are implemented in a lightweight virtual machine, but essentially they allow for complex rules such as a vote must have a voter, a candidate, a time to vote by, as well as other items such as a co-signer for the vote. All of which are implemented with cryptographic signatures. Smart contracts are self-enforceable and trustless, which make them a perfect candidate to remove likely avenues of corruption. Overview of the Setup Steps Establishing Polling Stations on the Blockchain Each polling station would have a digital wallet ID, owned by polling station. Those polling stations would register their public ID with the district, and the state on a public blockchain. The registered information would include: the physical address of the polling station, phone number, hours, and the public key of the polling station wallet. This will later be used to verify the eligibility of a polling station to have that station’s votes counted. Each state will have ROCK THE BLOCKCHAIN 7 a pool of votecoins with a maximum of one coin possible for each candidate, for each of the actual registered voters. The polling stations will then be issued the amount of coins needed to distribute to the voters. The main blockchain will record a transaction of each of these votecoin being transferred. Figure 2 - Polling station registration on the blockchain. Issuing a Voting Wallet to Voters The voting process begins with an individual traveling to a polling station and providing identification of eligibility to vote. Once there, they will provide proof of eligibility to vote. The eligibility to vote, which include, but is not limited to: their full name, birth date, postal code, and identification number provided from the government. The polling station will then take a picture of the person and generate a Scrypt hash of their details with 100,000 rounds. This hash will be called a “VOTERID hash.” The Scrypt hashing algorithm will be use of being memory hard, and prevent GPU cracking (Percival, 2009). The polling station will then commit to the blockchain a transaction of the individual who has registered to vote, along with the date and ROCK THE BLOCKCHAIN 8 timestamp, and the VOTERID hash. At this point, if the VOTERID hash does not already exist on the blockchain, a fresh set of keypairs will be generated. The voter’s wallet, which consists of these public and private keypairs, will be provided in the form of printed QR codes to the now registered voter, and the keypair is not saved. This machine used to generate the wallet is completely air-gapped. The air-gapping of the system provides the prevention of internet based tampering and credibility of the system. If a voter does not want the polling station to generate their voter wallet, they may provide a unique one themselves. At this point, there will
Recommended publications
  • Examining the Lightning Network on a Protocol Level
    Examining the Lightning network on a protocol level Rene Pickhardt (Data Science Consultant) https://www.rene-pickhardt.de & https://twitter.com/renepickhardt München 19.7.2018 I've been told I should start any talk with something everybody in the audience should know A standard Bitcoin Transaction has 6 data fields ( The following is a brief summary of https://en.bitcoin.it/wiki/Transaction#Input ) ● Version number (4 Bytes) ● In-Counter (1-9 Bytes) ● List of inputs (depending on the Value of <In-Counter>) ● Out-Counter (1-9 Bytes) ● List of Outputs (depending on the Value of <Out-Counter>) ● Lock_time (4 Bytes) ( Bitcoin Transaction with 3 inputs and 2 outputs Data consists mainly of executable scripts! A chain of Bitcoin Transactions with 3 UTXO ● Outputs are references by the inputs ● The Script in the output defines how the transaction can be spent ● Owning Bitcoins means being able to spend the output of an unspent transaction ○ Provide an input script ○ Concatenate it with with some outputscript of an unspent transaction ○ The combined Script needs to evaluate to True Spending a Pay-to-PubkeyHash (standard TX) ● ScriptPubKey (aka the Output Script) ○ OP_DUP OP_HASH160 <pubKeyHash> OP_EQUALVERIFY OP_CHECKSIG ● ScriptSig: (aka the Input Script) ○ <sig> <pubKey> ● Explainations ○ OP_CODES are the instructions of the script language within Bitcoin ○ <data> is depicted like html tags with lesser than and greater than signs ○ The complete script is concatenated as Input || Output and then being executed on a Stack machine <sig> <pubKey>
    [Show full text]
  • Deviant Decentralized Exchange
    DDEEVVXX Deviant Decentralized Exchange A hybrid exchange leveraging Smartcoins on the Bitshares (BTS) blockchain. CONTENTS 03 What is the current landscape for trading crypto assets? 05 Centralized Exchanges 08 Decentralized Exchanges 11 Hybrid Exchanges 13 DEVX Platform 14 Platform Overview 16 DEVX Smart Coin 17 DEVX off-chain engine - The DEVX Transient Protocol (DEVTP) 19 Trading Process 25 What is the status of development / roadmap for these innovations? 26 DEVX Team 03 Crypto assets are here to stay. According to Apple co-founder Steve Wozniak, Bitcoin and WHAT IS THE blockchain will be the next major IT revolution, and will achieve full CURRENT potential in a decade. According to LANDSCAPE FOR Paypal co-founder Peter Thiel, Bitcoin is the next Digital Gold. TRADING CRYPTO Since Bitcoin’s release in 2009, 1,622 altcoin variants have been issued. ASSETS? 2018 has already broken all records with 345 Initial Coin Offerings, and over US$ 7.7 billion of capital raised. DEVX the next revolution 04 Growth in the number of crypto assets has also driven an increase in crypto asset trading, in order to satisfy the requirements of the increasingly numerous universe of holders, investors, arbitrageurs, market makers, speculators and hedgers. There are presently more than 500 crypto asset exchanges to bring together buyers and sellers, where crypto assets are traded for either different digital currencies, or for other assets such as conventional fiat money. These exchanges operate mostly outside Western countries, and range from fully-online platforms to bricks-and-mortar businesses. Currently, almost two thirds of all daily global crypto asset trading volume results from activity on just ten of these exchanges.
    [Show full text]
  • Blocksci: Design and Applications of a Blockchain Analysis Platform
    BlockSci: Design and applications of a blockchain analysis platform Harry Kalodner Steven Goldfeder Alishah Chator [email protected] [email protected] [email protected] Princeton University Princeton University Johns Hopkins University Malte Möser Arvind Narayanan [email protected] [email protected] Princeton University Princeton University ABSTRACT to partition eectively. In fact, we conjecture that the use of a tra- Analysis of blockchain data is useful for both scientic research ditional, distributed transactional database for blockchain analysis and commercial applications. We present BlockSci, an open-source has innite COST [5], in the sense that no level of parallelism can software platform for blockchain analysis. BlockSci is versatile in outperform an optimized single-threaded implementation. its support for dierent blockchains and analysis tasks. It incorpo- BlockSci comes with batteries included. First, it is not limited rates an in-memory, analytical (rather than transactional) database, to Bitcoin: a parsing step converts a variety of blockchains into making it several hundred times faster than existing tools. We a common, compact format. Currently supported blockchains in- describe BlockSci’s design and present four analyses that illustrate clude Bitcoin, Litecoin, Namecoin, and Zcash (Section 2.1). Smart its capabilities. contract platforms such as Ethereum are outside our scope. Second, This is a working paper that accompanies the rst public release BlockSci includes a library of useful analytic and visualization tools, of BlockSci, available at github.com/citp/BlockSci. We seek input such as identifying special transactions (e.g., CoinJoin) and linking from the community to further develop the software and explore addresses to each other based on well-known heuristics (Section other potential applications.
    [Show full text]
  • Accounting for and Auditing of Digital Assets Digital Assets Working Group
    Practice aid Accounting for and auditing of digital assets Digital Assets Working Group Accounting Subgroup Matthew Schell, Chair Kevin Jackson Mark Murray Crowe LLP PwC RSM US LLP Michael Bingham Jin Koo Amy Park US Government Accountability BDO USA LLP Deloitte & Touche LLP Office Corey McLaughlin Beth Paul Brian Fields Cohen & Company PwC KPMG LLP Lan Ming Aleks Zabreyko Rahul Gupta Ernst & Young LLP Connor Group Grant Thornton LLP Christopher Moore Crowe LLP Auditing Subgroup Amy Steele, Chair Angie Hipsher-Williams Shelby Murphy Deloitte & Touche LLP Crowe LLP Deloitte & Touche LLP Michael Bingham Michael Kornstein Christian Randall US Government Accountability Office Ernst & Young LLP Cohen & Company Jay Brodish Sara Krople Jay Schulman PwC Crowe LLP RSM US LLP Damon Busse Bryan Martin Robert Sledge Baker Tilly Virchow Krause, LLP BDO USA LLP KPMG LLP Mary Grace Davenport Dylan McDermott Jagruti Solanki PwC Coinbase Aprio Jeremy Goss Grant Thornton LLP AICPA Senior Committees Financial Reporting Executive Committee Angela Newell, Chair Mark Crowley Jeff Sisk Kelly Ardrey Jr. Sean Lager Dusty Stallings Michelle Avery Mark Northan Lynne Triplett Lee Campbell Bill Schneider Mike Winterscheidt Cathy Clarke Rachel Simons Aleks Zabreyko Assurance Services Executive Committee Jim Burton, Chair Mary Grace Davenport Brad Muniz Christine Anderson Chris Halterman Dyan Rohol Daniel Balla Elaine Howle Kimberly Ellison-Taylor Jennifer Burns Bryan Martin Miklos Vasarhelyi Auditing Standards Board Tracy Harding, Chair AICPA staff Diana Krupica,
    [Show full text]
  • The Lightning Network - Deconstructed and Evaluated
    The Lightning Network - Deconstructed and Evaluated Anti-Money Laundering (AML) and Anti-Terrorist Financing (ATF) professionals, especially those working in the blockchain and cryptocurrency environment, may have heard of the second layer evolution of Bitcoin's blockchain - the Lightning Network, (LN). This exciting new and rapidly deploying technology offers innovative solutions to solve issues around the speed of transaction times using bitcoin currently, but expandable to other tokens. Potentially however, this technology raises regulatory concerns as it arguably makes, (based on current technical limitations), bitcoin transactions truly anonymous and untraceable, as opposed to its current status, where every single bitcoin can be traced all the way back to its coinbase transaction1 on the public blockchain. This article will break down the Lightning Network - analyzing how it works and how it compares to Bitcoin’s current system, the need for the technology, its money laundering (ML) and terrorist financing (TF) risks, and some thoughts on potential regulatory applications. Refresher on Blockchain Before diving into the Lightning Network, a brief refresher on how the blockchain works - specifically the Bitcoin blockchain (referred to as just “Bitcoin” with a capital “B” herein) - is required. For readers with no knowledge or those wishing to learn more about Bitcoin, Mastering Bitcoin by Andreas Antonopoulos2 is a must read, and for those wishing to make their knowledge official, the Cryptocurrency Certification Consortium, (C4) offers the Certified Bitcoin Professional (CBP) designation.3 Put simply, the blockchain is a growing list of records that can be visualized as a series of blocks linked by chains. Each block contains specific information - in Bitcoin’s case, a list of transactions and their data, which includes the time, date, amount, and the counterparties4 of each transaction.
    [Show full text]
  • Ring Confidential Transactions
    ISSN 2379-5980 (online) DOI 10.5195/LEDGER.2016.34 RESEARCH ARTICLE Ring Confidential Transactions Shen Noether,∗ Adam Mackenzie, the Monero Research Lab† Abstract. This article introduces a method of hiding transaction amounts in the strongly decentralized anonymous cryptocurrency Monero. Similar to Bitcoin, Monero is a cryptocur- rency which is distributed through a proof-of-work “mining” process having no central party or trusted setup. The original Monero protocol was based on CryptoNote, which uses ring signatures and one-time keys to hide the destination and origin of transactions. Recently the technique of using a commitment scheme to hide the amount of a transaction has been dis- cussed and implemented by Bitcoin Core developer Gregory Maxwell. In this article, a new type of ring signature, A Multilayered Linkable Spontaneous Anonymous Group signature is described which allows one to include a Pedersen Commitment in a ring signature. This construction results in a digital currency with hidden amounts, origins and destinations of transactions with reasonable efficiency and verifiable, trustless coin generation. The author would like to note that early drafts of this were publicized in the Monero Community and on the #bitcoin-wizards IRC channel. Blockchain hashed drafts are available showing that this work was started in Summer 2015, and completed in early October 2015.17 An eprint is also available at http://eprint.iacr.org/2015/1098. 1. Introduction Recall that in Bitcoin each transaction is signed by the owner of the coins being sent and these signatures verify that the owner is allowed to send the coins. This is entirely analogous to the signing of a check from your bank.
    [Show full text]
  • Blockchain Terminology: a GLOSSARY for BEGINNERS
    Blockchain Terminology: A GLOSSARY FOR BEGINNERS Learn the basic terminology for blockchain technology from CompTIA. We have the entire list of terms beginners need to know. 51% Attack Blockchain (Public a.k.a. Permissionless) When more than 50% of the miners in a blockchain launch an A blockchain that resides on a network of computers around the attack on the rest of the nodes/users to attempt to steal assets world that is accessible to everyone. or double spend. Byzantine Fault Tolerance (BFT) Address A property of a distributed, decentralized system to resist complete Much like a URL, a blockchain address is the location to or from failure even when some of the nodes fail or act maliciously. which transactions occur on the blockchain. Centralized Alt-coin A system or process for which there is a singular (i.e., central) Any coin or token other than Bitcoin. source of authority, control and/or truth. Attestation Ledger Chain of Custody A register or account book created for the purpose of providing The entire chain of documentation of ownership of a product support/evidence of individual transactions. Normally, an during its lifecycle from raw materials to the final end user. attestation ledger is used to verify that a transaction has been carried out, or to verify the authenticity of products or Chaincode transactions. Another name for a smart contract. Bitcoin Consensus Mechanism - Proof of Authority (PoA) The first and most popular cryptocurrency based on DLT PoA is an alternative form to the PoS algorithm. Instead of staking technology developed from a whitepaper written by Satoshi cryptocurrency (wealth), in PoA you stake your identity.
    [Show full text]
  • The Lightning Network Jagger S
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by AIS Electronic Library (AISeL) Association for Information Systems AIS Electronic Library (AISeL) International Conference on Information Resources CONF-IRM 2019 Proceedings Management (CONF-IRM) 5-2019 The potential effect off-chain instant payments will have on cryptocurrency scalability issues – The Lightning Network Jagger S. Bellagarda The University of Pretoria, [email protected] Follow this and additional works at: https://aisel.aisnet.org/confirm2019 Recommended Citation Bellagarda, Jagger S., "The potential effect off-chain instant payments will have on cryptocurrency scalability issues – The Lightning Network" (2019). CONF-IRM 2019 Proceedings. 2. https://aisel.aisnet.org/confirm2019/2 This material is brought to you by the International Conference on Information Resources Management (CONF-IRM) at AIS Electronic Library (AISeL). It has been accepted for inclusion in CONF-IRM 2019 Proceedings by an authorized administrator of AIS Electronic Library (AISeL). For more information, please contact [email protected]. The potential effect off-chain instant payments will have on cryptocurrency scalability issues – The Lightning Network Jagger S. Bellagarda The University of Pretoria [email protected] Abstract The rapid increase in popularity regarding cryptocurrency and specifically Bitcoin has been unprecedented over the past number of years. However, scalability has become a major barrier keeping it from gaining wide spread mass adoption. The purpose of this paper will be to investigate the potential effect off-chain instant payments will have on cryptocurrency scalability issues, with a focus on the Lightning Network. This will be achieved by means of a quantitative study through the process of testing various factors associated with the Lightning Network against another potential scalability solution, increasing block size limit.
    [Show full text]
  • Cryptocurrencies Without Proof of Work
    Cryptocurrencies without Proof of Work Iddo Bentov1, Ariel Gabizon2, and Alex Mizrahi3 1 Department of Computer Science, Technion, [email protected] 2 Department of Computer Science, Technion, [email protected] 3 chromaway.com, [email protected] Abstract. We study decentralized cryptocurrency protocols in which the participants do not deplete physical scarce resources. Such protocols commonly rely on Proof of Stake, i.e., on mechanisms that extend voting power to the stakeholders of the system. We offer analysis of existing protocols that have a substantial amount of popularity. We then present our novel pure Proof of Stake protocols, and argue that they help in mitigating problems that the existing protocols exhibit. 1 Introductiony The decentralized nature of Bitcoin [7, 12] means that anyone can become a \miner" at any point in time, and thus participate in the security maintenance of the Bitcoin system and be compensated for this work. The miners continuously perform Proof of Work (PoW) computations, meaning that they attempt to solve difficult computational tasks. The purpose of the PoW element in the Bitcoin system is to reach consensus regarding the ledger history, thereby synchronizing the transactions and making the users secure against double-spending attacks. The miners who carry out PoW computations can be viewed as entities who vote on blocks of transactions that the users recently broadcasted to the network, so that the decision-making power of each miner is in proportion to the amount of computational power that she has. Thus, an individual miner who has a fraction p of the total mining power can create each new block with probability p, though other factors such as “selfish mining" [1,5,6] can influence p.
    [Show full text]
  • Lightning Network Summary
    The Bitcoin Lightning Network http://lightning.network The Lightning Network is a decentralized system for instant, high-volume micropayments that removes the risk of delegating custody of funds to trusted third parties. Bitcoin, the world's most widely used and valuable Alice digital currency, allows anyone to send value without a trusted intermediary or depository. Bitcoin contains an advanced scripting system allowing users to program instructions for funds. There are, however, some Bob drawbacks to bitcoin's decentralized design. Transactions confirmed on the bitcoin blockchain take up to one hour before they are irrevesible. Micropayments, or payments less than a few cents, are inconsistently confirmed, and fees render such transactions unviable on the network today. The Lightning Network solves these problems. It is one of the first implementations of a multi-party Smart Contract (programmable money) using bitcoin's built-in scripting. The Lightning Network is leading technological development in multiparty financial computations with bitcoin. Instant Payments. Bitcoin aggregates transactions into blocks spaced ten minutes apart. Payments are widely regarded as secure on bitcoin after confirmation of six blocks, or about one hour. On the Lightning Network, payments don't need block confirmations, and are instant and atomic. Lightning can be used at retail point-of-sale terminals, with user device-to-device transactions, or anywhere instant payments are needed. Micropayments. New markets can be opened with the possibility of micropayments. Lightning enables one to send funds down to 0.00000001 bitcoin without custodial risk. The bitcoin blockchain currently enforces a minimum output size many hundreds of times higher, and a fixed per-transaction fee which makes micropayments impractical.
    [Show full text]
  • Coin-Operated Capitalism
    University of Pennsylvania Carey Law School Penn Law: Legal Scholarship Repository Faculty Scholarship at Penn Law 2019 Coin-Operated Capitalism Shaanan Cohney University of Pennsylvania David A. Hoffman University of Pennsylvania Carey Law School Jeremy Sklaroff University of Pennsylvania David A. Wishnick University of Pennsylvania - Center for Technology, Innovation and Competition Follow this and additional works at: https://scholarship.law.upenn.edu/faculty_scholarship Part of the Business Law, Public Responsibility, and Ethics Commons, Contracts Commons, Corporate Finance Commons, Entrepreneurial and Small Business Operations Commons, Internet Law Commons, Law and Economics Commons, Political Economy Commons, Science and Technology Law Commons, and the Technology and Innovation Commons Repository Citation Cohney, Shaanan; Hoffman, David A.; Sklaroff, Jeremy; and Wishnick, David A., "Coin-Operated Capitalism" (2019). Faculty Scholarship at Penn Law. 2027. https://scholarship.law.upenn.edu/faculty_scholarship/2027 This Article is brought to you for free and open access by Penn Law: Legal Scholarship Repository. It has been accepted for inclusion in Faculty Scholarship at Penn Law by an authorized administrator of Penn Law: Legal Scholarship Repository. For more information, please contact [email protected]. COLUMBIA LAW REVIEW VOL. 119 APRIL 2019 NO. 3 ARTICLES COIN-OPERATED CAPITALISM Shaanan Cohney,* David Hoffman,** Jeremy Sklaroff *** & David Wishnick **** This Article presents the legal literature’s first detailed analysis of the inner workings of Initial Coin Offerings (ICOs). We characterize the ICO as an example of financial innovation, placing it in kinship with venture capital contracting, asset securitization, and (obviously) the IPO. We also take the form seriously as an example of technological innovation, in which promoters are beginning to effectuate their promises to investors through computer code, rather than traditional contract.
    [Show full text]
  • Coin-Operated Capitalism
    COLUMBIA LAW REVIEW VOL. 119 APRIL 2019 NO. 3 ARTICLES COIN-OPERATED CAPITALISM Shaanan Cohney,* David Hoffman,** Jeremy Sklaroff *** & David Wishnick **** This Article presents the legal literature’s first detailed analysis of the inner workings of Initial Coin Offerings (ICOs). We characterize the ICO as an example of financial innovation, placing it in kinship with venture capital contracting, asset securitization, and (obviously) the IPO. We also take the form seriously as an example of technological innovation, in which promoters are beginning to effectuate their promises to investors through computer code, rather than traditional contract. To understand the dynamics of this shift, we first collect contracts, “whitepapers,” and other disclosures for the fifty top-grossing ICOs of 2017. We then analyze how the software code controlling the projects’ ICOs reflected (or failed to reflect) their disclosures. Our inquiry reveals that many ICOs failed even to promise that they would protect investors against insider self-dealing. Fewer still manifested such promises in code. Surprisingly, in a community known for espousing a technolibertarian belief in the power of “trustless trust” built with carefully designed code, a significant fraction of issuers retained centralized control through * P.h.D. Candidate, University of Pennsylvania, School of Engineering and Applied Science. ** Professor of Law, University of Pennsylvania Law School. *** J.D. 2018, University of Pennsylvania Law School; M.B.A. 2018, The Wharton School of the University of Pennsylvania. **** Academic Fellow, University of Pennsylvania Law School’s Center for Technology, Innovation and Competition. Author order is alphabetical. We thank Andrew Baker, Tom Baker, Robert Bartlett, Bill Bratton, Chris Brummer, Tony Casey, Peter Conti-Brown, Jill Fisch, Gabe Kaptchuk, Joshua Mitts, Mark Nevitt, Ori Oren, Max Raskin, Usha Rodrigues, Alec Webley, Kevin Werbach, and Aaron Wright for helpful comments.
    [Show full text]