Escaping the Ossification Trap with Gnunet

Total Page:16

File Type:pdf, Size:1020Kb

Escaping the Ossification Trap with Gnunet Escaping the Ossification Trap with GNUnet Christian Grothoff BFH & The GNU Project 25.1.2018 \We shape our tools, and thereafter our tools shape us". {John Culkin What can be done? I Democracies are slow ) Effective regulation of mega-corporations exists only under dictatorships Dictatorship or Corpocracy? Regulation? I Charles Stross (@34c4) warns: Companies are AIs that develop faster than the law I Julia Reda (@IGF) warns: Regulation of platforms paradoxically can give them more power Regulation? I Charles Stross (@34c4) warns: Companies are AIs that develop faster than the law I Julia Reda (@IGF) warns: Regulation of platforms paradoxically can give them more power I Democracies are slow ) Effective regulation of mega-corporations exists only under dictatorships Dictatorship or Corpocracy? Better Technology! Data protection! Decentralization! Self-Organization! Technological impact assessment!1 1Difficult, but better than design-by-buzzword! Technological impact assessment case-study: Name systems DNS/DNSSEC DNS Server Root Zone a.root-servers.net. www.example.com? a.gtld-servers.net.test E2D3C9.... DNSSEC Trust Anchor NS . S4LXnQiBS... 49AAC1... DS RRSIG www.example.com? Recursive DNS Server Stub www.example.com? Name .com Resolver Server NS a.gtld-servers.net.test a.gtld-servers.net. A 93.184.216.119 DS 3490A6.... RRSIG example.com. K0rp9n... RRSIG com. U/ZW6P3c... AD www.example.com? RRSIG A 93.184.216.119 example.com. K0rp9n... DNS Server example.com a.iana-servers.net. RAINS Authority Server Root Zone 44 ) com ZK ; :registry www.example.com? com ISD-44 Trust Anchor ; ISD-44 Trust Anchor (NS RZK44 44 RZK & QS 44 44 S RZK www.example.com? Client query service www.example.com? Authority Server (in ISD 44) (in ISD 44) com.registry SZKcom (NS; exauth:net; ZKexample:com) SQS44 (A; 93:184:216:11) S www.example.com? ZK example : com ( A ; 93 :184 ? Indicates a query, otherwise a response :216 NS Delegation record in RAINS (with zone key) :11) A IPv4 address record SK (V ) Signature with key K over value(s) V Authority Server QS44 Key of (anycasted) query service in ISD 44 exauth.net TRC44 Trusted root configuration of ISD 44 RZK44 Root zone key of ISD 44 ZKname Zone key of authority for \name" Namecoin Append registration to block chain Namecoin Client P2P Network Get copy of Block Chain block chain Local Copy of Block Chain The GNU Name System (GNS) Pbob zone database Bob's NSS www.Pbob? Bob's GNS Service carol PKEY Pcarol = P .gnu bob A 203.0.113.54 www A 203.0.113.54 PUT E( PUT E( PKEY A (H(carol, 203.0.113.54)) (H(www, P carol )) P bob P bob ), ), Carols's GNS Service DHT P2P Network PUT (H(www, Pcarol ), E(A 203.0.113.34)) )) )) bob ) carol P P carol Pcarol zone database P www A 203.0.113.34 (H(carol, PKEY (H(www, 203.0.113.34) A E( GET E( GET www.Palice ? Palice zone database Alice's NSS A 203.0.113.13 Alice's GNS Service bob PKEY Pbob = P www.carol.bob.P ? .gnu alice alice www A 203.0.113.13 A 203.0.113.34 But you cannot change DNS! In a peer-to-peer network nodes interact as equals. Peer-to-Peer Network Classification I What is the network designed to achieve? I Do some peers have priviledged or special roles? I Can new nodes freely join? Underlay P2P networks I 802.11s I Freifunk (B.A.T.M.A.N) Overlay P2P networks I Gnutella / Bittorrent I Waste I Freenet / RetroShare / I2P / Tor I Bitcoin / Altcoins Full-Stack P2P networks I GNUnet Peer-to-Peer Networks The Internet Protocol (IP) is a peer-to-peer protocol. Peer-to-Peer Networks The Internet Protocol (IP) is a peer-to-peer protocol. Underlay P2P networks I 802.11s I Freifunk (B.A.T.M.A.N) Overlay P2P networks I Gnutella / Bittorrent I Waste I Freenet / RetroShare / I2P / Tor I Bitcoin / Altcoins Full-Stack P2P networks I GNUnet Full Stack Internet GNUnet Google Applications DNS/X.509 GNU Name System TCP/UDP CADET (Axolotl+SCTP) IP/BGP R5N DHT Ethernet CORE (OTR) Phys. Layer HTTPS/TCP/WLAN/... Raised Abstraction Level SecuShare p≡p Reuters Social Lake CRDT-Git IP PSYC GNU Taler Xolotl Scalarproduct SMC PT/VPN Multicast Fog-of-Trust RPS Set intersection RegEx GNU Name System CADET (Axolotl+SCTP) R5N DHT CORE (OTR) HTTPS TCP WLAN IP ... Reality is messy2 secushare voting social conversation secretsharing psyc gns speaker microphone consensus psycstore multicast revocation scalarproduct zonemaster pt fs set namestore vpn exit dns dnsparser datastore identity cadet regex tun dnsstub gnsrecord dht hostlist block rps datacache nse topology core transport ats peerinfo fragmentation nat hello 2But this applies to the Internet as well. Lake Peers may not be all equal Challenges I Lack of business models: no control, no data, no property I Self-organizing protocols achieving usability and robustness I Fault-tolerance, scalability and decentralization I Resource utilization, accounting and privacy () https://taler.net/) I Public awareness about value of privacy and independence Ossification The older the Internet becomes, the harder it is to change! Evolution can still happen in an overlay network! It likely is now or never! Join us and build it!.
Recommended publications
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • N2N: a Layer Two Peer-To-Peer VPN
    N2N: A Layer Two Peer-to-Peer VPN Luca Deri1, Richard Andrews2 ntop.org, Pisa, Italy1 Symstream Technologies, Melbourne, Australia2 {deri, andrews}@ntop.org Abstract. The Internet was originally designed as a flat data network delivering a multitude of protocols and services between equal peers. Currently, after an explosive growth fostered by enormous and heterogeneous economic interests, it has become a constrained network severely enforcing client-server communication where addressing plans, packet routing, security policies and users’ reachability are almost entirely managed and limited by access providers. From the user’s perspective, the Internet is not an open transport system, but rather a telephony-like communication medium for content consumption. This paper describes the design and implementation of a new type of peer-to- peer virtual private network that can allow users to overcome some of these limitations. N2N users can create and manage their own secure and geographically distributed overlay network without the need for central administration, typical of most virtual private network systems. Keywords: Virtual private network, peer-to-peer, network overlay. 1. Motivation and Scope of Work Irony pervades many pages of history, and computing history is no exception. Once personal computing had won the market battle against mainframe-based computing, the commercial evolution of the Internet in the nineties stepped the computing world back to a substantially rigid client-server scheme. While it is true that the today’s Internet serves as a good transport system for supplying a plethora of data interchange services, virtually all of them are delivered by a client-server model, whether they are centralised or distributed, pay-per-use or virtually free [1].
    [Show full text]
  • A Generic Data Exchange System for F2F Networks
    The Retroshare project The GXS system Decentralize your app! A Generic Data Exchange System for F2F Networks Cyril Soler C.Soler The GXS System 03 Feb. 2018 1 / 19 The Retroshare project The GXS system Decentralize your app! Outline I Overview of Retroshare I The GXS system I Decentralize your app! C.Soler The GXS System 03 Feb. 2018 2 / 19 The Retroshare project The GXS system Decentralize your app! The Retroshare Project I Mesh computers using signed TLS over TCP/UDP/Tor/I2P; I anonymous end-to-end encrypted FT with swarming; I mail, IRC chat, forums, channels; I available on Mac OS, Linux, Windows, (+ Android). C.Soler The GXS System 03 Feb. 2018 3 / 19 The Retroshare project The GXS system Decentralize your app! The Retroshare Project I Mesh computers using signed TLS over TCP/UDP/Tor/I2P; I anonymous end-to-end encrypted FT with swarming; I mail, IRC chat, forums, channels; I available on Mac OS, Linux, Windows. C.Soler The GXS System 03 Feb. 2018 3 / 19 The Retroshare project The GXS system Decentralize your app! The Retroshare Project I Mesh computers using signed TLS over TCP/UDP/Tor/I2P; I anonymous end-to-end encrypted FT with swarming; I mail, IRC chat, forums, channels; I available on Mac OS, Linux, Windows. C.Soler The GXS System 03 Feb. 2018 3 / 19 The Retroshare project The GXS system Decentralize your app! The Retroshare Project I Mesh computers using signed TLS over TCP/UDP/Tor/I2P; I anonymous end-to-end encrypted FT with swarming; I mail, IRC chat, forums, channels; I available on Mac OS, Linux, Windows.
    [Show full text]
  • IPFS and Friends: a Qualitative Comparison of Next Generation Peer-To-Peer Data Networks Erik Daniel and Florian Tschorsch
    1 IPFS and Friends: A Qualitative Comparison of Next Generation Peer-to-Peer Data Networks Erik Daniel and Florian Tschorsch Abstract—Decentralized, distributed storage offers a way to types of files [1]. Napster and Gnutella marked the beginning reduce the impact of data silos as often fostered by centralized and were followed by many other P2P networks focusing on cloud storage. While the intentions of this trend are not new, the specialized application areas or novel network structures. For topic gained traction due to technological advancements, most notably blockchain networks. As a consequence, we observe that example, Freenet [2] realizes anonymous storage and retrieval. a new generation of peer-to-peer data networks emerges. In this Chord [3], CAN [4], and Pastry [5] provide protocols to survey paper, we therefore provide a technical overview of the maintain a structured overlay network topology. In particular, next generation data networks. We use select data networks to BitTorrent [6] received a lot of attention from both users and introduce general concepts and to emphasize new developments. the research community. BitTorrent introduced an incentive Specifically, we provide a deeper outline of the Interplanetary File System and a general overview of Swarm, the Hypercore Pro- mechanism to achieve Pareto efficiency, trying to improve tocol, SAFE, Storj, and Arweave. We identify common building network utilization achieving a higher level of robustness. We blocks and provide a qualitative comparison. From the overview, consider networks such as Napster, Gnutella, Freenet, BitTor- we derive future challenges and research goals concerning data rent, and many more as first generation P2P data networks, networks.
    [Show full text]
  • Privacy Enhancing Technologies 2003 an Analysis of Gnunet And
    Privacy Enhancing Technologies 2003 An Analysis of GNUnet and the Implications for Anonymous, Censorship-Resistant Networks Dennis Kügler Federal Office for Information Security, Germany [email protected] 1 Anonymous, Censorship-Resistant Networks • Anonymous Peer-to-Peer Networks – Gnutella • Searching is relatively anonymous • Downloading is not anonymous • Censorship-Resistant Networks – Eternity Service • Distributed storage medium • Attack resistant • Anonymous, Censorship-Resistant Networks – Freenet – GNUnet 2 GNUnet: Obfuscated, Distributed Filesystem Content Hash Key: [H(B),H(E (B))] • H(B) – Content encryption: H(B) – Unambiguous filename: H(E (B)) H(B) • Content replication – Caching while delivering – Based on unambiguous filename • Searchability – Keywords 3 GNUnet: Peer-to-Peer MIX Network • Initiating node – Downloads content • Supplying nodes – Store content unencrypted • Intermediary nodes – Forward and cache encrypted content – Plausible deniability due to encryption • Economic model – Based on credit Query A Priority=20 B – Charge for queries c =c -20 B B - – Pay for responses 4 GNUnet Encoding • DBlocks DBlock DBlock ... DBlock – 1KB of the content – Content hash encrypted • IBlocks IBlock ... IBlock – CHKs of 25 DBlocks – Organized as tree – Content hash encrypted IBlock • RBlock – Description of the content – CHK of the root IBlock RBlock – Keyword encrypted 5 The Attacker Model • Attacker – Controls malicious nodes that behave correctly – Prepares dictionary of interesting keywords – Observes queries and
    [Show full text]
  • T U M a Digital Wallet Implementation for Anonymous Cash
    Technische Universität München Department of Informatics Bachelor’s Thesis in Information Systems A Digital Wallet Implementation for Anonymous Cash Oliver R. Broome Technische Universität München Department of Informatics Bachelor’s Thesis in Information Systems A Digital Wallet Implementation for Anonymous Cash Implementierung eines digitalen Wallets for anonyme Währungen Author Oliver R. Broome Supervisor Prof. Dr.-Ing. Georg Carle Advisor Sree Harsha Totakura, M. Sc. Date October 15, 2015 Informatik VIII Chair for Network Architectures and Services I conrm that this thesis is my own work and I have documented all sources and material used. Garching b. München, October 15, 2015 Signature Abstract GNU Taler is a novel approach to digital payments with which payments are performed with cryptographically generated representations of actual currencies. The main goal of GNU Taler is to allow taxable anonymous payments to non-anonymous merchants. This thesis documents the implementation of the Android version of the GNU Taler wallet, which allows users to create new Taler-based funds and perform payments with them. Zusammenfassung GNU Taler ist ein neuartiger Ansatz für digitales Bezahlen, bei dem Zahlungen mit kryptographischen Repräsentationen von echten Währungen getätigt werden. Das Hauptziel von GNU Taler ist es, versteuerbare, anonyme Zahlungen an nicht-anonyme Händler zu ermöglichen. Diese Arbeit dokumentiert die Implementation der Android-Version des Taler-Portemonnaies, der es Benutzern erlaubt, neues Taler-Guthaben zu erzeugen und mit ihnen Zahlungen zu tätigen. I Contents 1 Introduction 1 1.1 GNU Taler . .2 1.2 Goals of the thesis . .2 1.3 Outline . .3 2 Implementation prerequisites 5 2.1 Native libraries . .5 2.1.1 Libgcrypt .
    [Show full text]
  • CS505: Distributed Systems
    Cristina Nita-Rotaru CS505: Distributed Systems Lookup services. Chord. CAN. Pastry. Kademlia. Required Reading } I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, H. Balakrishnan, Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications, SIGCOMM 2001. } A Scalable Content-Addressable Network S.a Ratnasamy, P. Francis, M. Handley, R. Karp, S. Shenker, SIGCOMM 2001 } A. Rowstron and P. Druschel. "Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems". IFIP/ACM International Conference on Distributed Systems Platforms (Middleware), 2001 } Kademlia: A Peer-to-peer Information System Based on the XOR Metric. P. Maymounkov and D. Mazieres, IPTPS '02 2 DHTs 1: Lookup services Peer-to-Peer (P2P) Systems } Applications that take advantage of resources (storage, cycles, content, human presence) available at the edges of the Internet. } Characteristics: } System consists of clients connected through Internet and acting as peers } System is designed to work in the presence of variable connectivity } Nodes at the edges of the network have significant autonomy; no centralized control } Nodes are symmetric in function 4 DHTs Benefits of P2P and Applications } High capacity: all clients provide resources (bandwidth, storage space, and computing power). The capacity of the system increases as more nodes become part of the system. } Increased reliability: achieved by replicating data over multiple peers, and by enabling peers to find the data without relying on a centralized index server. } Applications:
    [Show full text]
  • Practical Anonymous Networking?
    gap – practical anonymous networking? Krista Bennett Christian Grothoff S3 lab and CERIAS, Department of Computer Sciences, Purdue University [email protected], [email protected] http://www.gnu.org/software/GNUnet/ Abstract. This paper describes how anonymity is achieved in gnunet, a framework for anonymous distributed and secure networking. The main focus of this work is gap, a simple protocol for anonymous transfer of data which can achieve better anonymity guarantees than many traditional indirection schemes and is additionally more efficient. gap is based on a new perspective on how to achieve anonymity. Based on this new perspective it is possible to relax the requirements stated in traditional indirection schemes, allowing individual nodes to balance anonymity with efficiency according to their specific needs. 1 Introduction In this paper, we present the anonymity aspect of gnunet, a framework for secure peer-to-peer networking. The gnunet framework provides peer discovery, link encryption and message-batching. At present, gnunet’s primary application is anonymous file-sharing. The anonymous file-sharing application uses a content encoding scheme that breaks files into 1k blocks as described in [1]. The 1k blocks are transmitted using gnunet’s anonymity protocol, gap. This paper describes gap and how it attempts to achieve privacy and scalability in an environment with malicious peers and actively participating adversaries. The gnunet core API offers node discovery, authentication and encryption services. All communication between nodes in the network is confidential; no host outside the network can observe the actual contents of the data that flows through the network. Even the type of the data cannot be observed, as all packets are padded to have identical size.
    [Show full text]
  • Zeronet Presentation
    ZeroNet Decentralized web platform using Bitcoin cryptography and BitTorrent network. ABOUT ZERONET Why? Current features We believe in open, free, and ◦ Real-time updated sites uncensored network and communication. ◦ Namecoin .bit domain support ◦ No hosting costs ◦ Multi-user sites Sites are served by visitors. ◦ Password less, Bitcoin's BIP32- ◦ Impossible to shut down based authorization It's nowhere because it's ◦ Built-in SQL server with P2P data everywhere. synchronization ◦ No single point of failure ◦ Tor network support Site remains online so long as at least 1 peer serving it. ◦ Works in any browser/OS ◦ Fast and works offline You can access the site even if your internet is unavailable. HOW DOES IT WORK? THE BASICS OF ASYMMETRIC CRYPTOGRAPHY When you create a new site you get two keys: Private key Public key 5JNiiGspzqt8sC8FM54FMr53U9XvLVh8Waz6YYDK69gG6hso9xu 16YsjZK9nweXyy3vNQQPKT8tfjCNjEX9JM ◦ Only you have it ◦ This is your site address ◦ Allows you to sign new content for ◦ Using this anyone can verify if the your site. file is created by the site owner. ◦ No central registry ◦ Every downloaded file is verified, It never leaves your computer. makes it safe from malicious code inserts or any modifications. ◦ Impossible to modify your site without it. MORE INFO ABOUT CRYPTOGRAPHY OF ZERONET ◦ ZeroNet uses the same elliptic curve based encryption as in your Bitcoin wallet. ◦ You can accept payments directly to your site address. ◦ Using the current fastest supercomputer, it would take around 1 billion years to "hack" a private key. WHAT HAPPENS WHEN YOU VISIT A ZERONET SITE? WHAT HAPPENS WHEN YOU VISIT A ZERONET SITE? (1/2) 1 Gathering visitors IP addresses: Please send some IP addresses for site 1EU1tbG9oC1A8jz2ouVwGZyQ5asrNsE4Vr OK, Here are some: 12.34.56.78:13433, 42.42.42.42:13411, ..
    [Show full text]
  • Balancing Privacy and Accountability in Digital Payment Methods Using Zk-Snarks
    1 Faculty of Electrical Engineering, Mathematics & Computer Science Balancing privacy and accountability in digital payment methods using zk-SNARKs Tariq Bontekoe M.Sc. Thesis October 2020 Supervisors: prof. dr. M. J. Uetz (UT) dr. M. H. Everts (TNO/UT) dr. B. Manthey (UT) dr. A. Peter (UT) Department Applied Mathematics Discrete Mathematics & Mathematical Programming Department Computer Science 4TU Cyber Security Faculty of Electrical Engineering, Mathematics and Computer Science University of Twente Preface This thesis concludes my seven years (and a month) as a student. During all these years I have certainly enjoyed myself and feel proud of everything I have done and achieved. Not only have I completed a bachelor’s in Applied Mathematics, I have also spent a year as a board member of my study association W.S.G. Abacus, spent a lot of time as a student assistant, and have made friends for life. I have really enjoyed creating this final project, in all its ups and downs, that concludes not only my master’s in Applied Mathematics but also that in Computer Science. This work was carried out at TNO in Groningen in the department Cyber Security & Ro- bustness. My time there has been amazing and the colleagues in the department have made that time even better. I am also happy to say that I will continue my time there soon. There are quite some people I should thank for helping my realise this thesis. First of all, my main supervisor Maarten who helped me with his constructive feedback, knowledge of blockchains and presence at both TNO and my university.
    [Show full text]
  • CS 552 Peer 2 Peer Networking
    CS 552 Peer 2 Peer Networking R. Martin Credit slides from B. Richardson, I. Stoica, M. Cuenca Peer to Peer • Outline • Overview • Systems: – Gnutella – Freenet – Chord – PlanetP Why Study P2P • Huge fraction of traffic on networks today – >=50%! • Exciting new applications • Next level of resource sharing – Vs. timesharing, client-server, P2P – E.g. Access 10’s-100’s of TB at low cost. P2P usage • CMU network (external to world), 2003 • 47% of all traffic was easily classifiable as P2P • 18% of traffic was HTTP • Other traffic: 35% – Believe ~28% is port- hopping P2P • Other sites have a similar distribution Big Picture • Gnutella – Focus is simple sharing – Using simple flooding • Bit torrent – Designed for high bandwidth • PlanetP – Focus on search and retrieval – Creates global index on each node via controlled, randomized flooding • Cord – Focus on building a distributed hash table (DHT) – Finger tables Other P2P systems • Freenet: – Focus privacy and anonymity – Builds internal routing tables • KaaZa • eDonkey • Napster – Success started the whole craze Key issues for P2P systems • Join/leave – How do nodes join/leave? Who is allowed? • Search and retrieval – How to find content? – How are metadata indexes built, stored, distributed? • Content Distribution – Where is content stored? How is it downloaded and retrieved? Search and Retrieval • Basic strategies: – Flooding the query – Flooding the index – Routing the query • Different tradeoffs depending on application – Robustness, scalability, legal issues Flooding the Query (Gnutella) N3 Lookup(“title”) N1 N2 N4 N5 Key=title N8 N6 Value=mp3 N7 Pros: highly robust. Cons: Huge network traffic Flooding the Index (PlanetP) Key1=title1 N3 N1 Key2=title2 N2 N4 N5 Lookup(“title4”) Key1=title3 N8 N6 Key2=title4 N7 Pros: Robust.
    [Show full text]
  • Digital Trade Coin: Towards a More Stable Digital Currency Rsos.Royalsocietypublishing.Org Alex Lipton, Thomas Hardjono and Alex Pentland
    Digital trade coin: towards a more stable digital currency rsos.royalsocietypublishing.org Alex Lipton, Thomas Hardjono and Alex Pentland MIT Connection Science, Massachusetts Institute of Technology, Cambridge, MA, USA Research TH, """"-"""#-('&)-()*" Cite this article: Lipton A, Hardjono T, We study the evolution of ideas related to creation of asset- Pentland A. !"#$ Digital trade coin: towards a backed currencies over the last 200 years and argue that recent more stable digital currency. R. Soc. open sci. developments related to distributed ledger technologies and !: #$"#%%. blockchains give asset-backed currencies a new lease of life. We http://dx.doi.org/#".#"&$/rsos.#$"#%% propose a practical mechanism combining novel technological breakthroughs with well-established hedging techniques for building an asset-backed transactional oriented cryptocurrency, which we call the digital trade coin (DTC). We show that in its Received: '# January !"#$ mature state, the DTC can serve as a much-needed counterpoint Accepted: #$ June !"#$ to fiat reserve currencies of today. #. Introduction Subject Category: This paper describes the concept of the asset-backed digital Computer science trade coins (DTCs), currently under development at MIT [1]. It outlines an approach to building a consortium of sponsors, Subject Areas: who contribute real assets, a narrow bank handling financial cryptography/human-computer transactions involving fiat currencies, and an administrator, who interaction/software issues the corresponding digital token in exchange for fiat payments and makes fiat payments in exchange for digital tokens. Keywords: In short, our proposal is to apply distributed ledger technology to blockchain technology, digital currency, give a new lease of life to the old notion of a sound asset-backed currency, and to use this currency as a transactional tool for a large electronic cash pool of potential users, including small and medium enterprises and individuals.
    [Show full text]