Abstract
Digital cash seems inevitable. But it’s not going to be bitcoin or the like, which will be regulated out of existence rather than being allowed to become mainstream currency. Central Bank Digital Currencies promise to eliminate crime but come with many of the problems that bitcoin set out to avoid. What do we actually need from digital cash? We had better figure it out before building and deploying unsuitable systems.
Author’s revision 45b of 2023-05-31 23:12:20 +0100 (Wed, 31 May 2023).
In Proc. Security Protocols Workshop 2023, Springer LNCS 14186.
BTW—I mumble to myself a lot. It’s OK to skip all these footnotes! .
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
Or, a cynic might suggest, vice versa—since it’s ultimately the rich people who determine how currency works.
- 2.
Interestingly, a term that was never actually used in the original bitcoin paper.
- 3.
With more faith in working code than in meddling governments and Central Banks.
- 4.
Of which they had conveniently stashed away the first few millions.
- 5.
The smart contract idea predates Ethereum: it was originally put forward by Nick Szabo [18] in 1997, but Ethereum implemented it and made it popular.
- 6.
Overestimating my competence, or flattering me, or both.
- 7.
If we ignore the drug sales that my fictional Bob mentioned earlier and that actually happened on Silk Road, but which were still a tiny fraction of the overall bitcoin economy.
- 8.
Insofar as you believe that a fiat currency like the dollar has any intrinsic value, which is in itself debatable—but that’s a separate story. Let’s suspend disbelief for the time being.
- 9.
But bitcoin’s first mover advantage has prevented more efficient proposals, no longer based on proof-of-work, from overtaking it.
- 10.
Although, after all, most of the speculators who buy bitcoin for dollars today do so in the hope of exchanging it for more dollars later, so they do still rely on the dollar being worth something to them.
- 11.
Or: under coercion from the evil government that is after you as a political dissident.
- 12.
The practice euphemistically referred to as “quantitative easing”.
- 13.
The “reference” being the value of one unit of currency, which decreases if more units are introduced. Distorting the reference that is used for pricing goods is as destabilising and perverse as surreptitiously changing the length of the standard meter or the duration of the standard second.
- 14.
Which, as a challenger to traditional banks and credit card companies, has a strong commercial incentive to be more convenient to the end user than the payment methods offered by the incumbents.
- 15.
How likely is it that the child regularly took backups of the device? How frequently do adults back up their smartphone?.
- 16.
But we already said what we think about claims of anonymity of digital cash, whether decentralised or CBDC.
- 17.
Or reasons for....
- 18.
Or, in China, AliPay and WeChat Pay—witness how Beijing dealt with that commercial competition [21].
- 19.
If not (and, after all, why not?) of bitcoin itself!.
- 20.
Those of us who believe in privacy will strongly resist attempts to create a society in which every payment is traceable: total and absolute transparency, especially if asymmetric, makes social interactions awkward. In small doses, plausible deniability and merciful white lies are necessary social lubricants, without which we lose freedom and control.
- 21.
Which would probably not be a sound idea if the security of an entire currency system had to depend on that dubious axiom—bearing in mind the 1996 “cautionary note” of my colleagues Anderson and Kuhn [1], which hasn’t lost its value today.
- 22.
Although Sharman [17] claims that anti-money-laundering policies have high costs but few practical benefits.
- 23.
Something that physical cash disallows for reasons of scale, but that non-anonymous digital cash could make commonplace.
- 24.
With the complicity of the fallacious “nothing to hide” argument, to which peaceful and unconcerned citizens subscribe until it’s too late.
- 25.
Particularly when coupled with the ability to redefine or reset the value of individual items of currency.
- 26.
See footnote 20.
- 27.
And what would be a good compromise for this threshold? The value of a house? Of a car? Of a bycicle? How much should be allowed to sneak under the radar?.
- 28.
Though they don’t quite say it in these words.
- 29.
Its consensus mechanism, designed for grass-roots operation whereby individuals would run their own nodes and anyone could devote spare cycles to mining bitcoin, has evolved into something unrecognisably different. The system, designed to avoid a central authority, is now much more centralized than originally intended: mining has become a specialist activity that only a handful of powerful “mining pools” have the resources to engage in. Individuals have no chance of competing against such pools and don’t even try. Regular people don’t run their own nodes and don’t check the validity of the blockchain, delegating the management of their wallets to intermediaries (the exchanges) who host them on their behalf. The customers of these intermediaries rarely (if ever) bother to check the consistency of a block.
- 30.
Fear Of Missing Out.
References
Anderson, R., Kuhn, M.: Tamper resistance–A cautionary note. In Proceeding of \(2^{nd}\) USENIX Workshop on Electronic Commerce (1996). ISBN 1-880446-83-9. http://www.cl.cam.ac.uk/mgk25/tamper.pdf
Bank of England and HM Treasury: The digital pound: a new form of money for households and businesses? (Consultation Paper) (2023). https://www.bankofengland.co.uk/-/media/boe/files/paper/2023/the-digital-pound-consultation-working-paper.pdf
Bank of Japan: The Bank of Japan’s Approach to Central Bank Digital Currency (2020). https://www.boj.or.jp/en/about/release_2020/data/rel201009e1.pdf
Bossone, B., Faraghallah, A.: Expiring money (Part I) (2022). https://blogs.worldbank.org/allaboutfinance/expiring-money-part-i
Brands, S.: An efficient off-line electronic cash system based on the representation problem. Technical report CS-R9323, Centrum voor Wiskunde en Informatica (CWI) (1993). https://ir.cwi.nl/pub/5303/05303D.pdf
Browne, H.: How You Can Profit from the Coming Devaluation. Arlington House (1970)
Buterin, V.: Ethereum: A Next-Generation Smart Contract and Decentralized Application Platform (2014). https://ethereum.org/669c9e2e2027310b6b3cdce6e1c52962/Ethereum_Whitepaper_-_Buterin_2014.pdf
Chaum, D.: Blind signatures for untraceable payments. In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds.) Advances in Cryptology, pp. 199–203. Springer, US, Boston, MA (1983). ISBN 978-1-4757-0602-4. https://doi.org/10.1007/978-1-4757-0602-4_18
Chaum, D., Brands, S.: Minting electronic cash. IEEE Spectr. 34(2), 30–34 (1997). https://doi.org/10.1109/6.570825. ISSN 0018–9235
Chaum, D., Fiat, A., Naor, M.: Untraceable electronic cash. In: Goldwasser, S. (ed) Advances in Cryptology–CRYPTO 1988, volume 403 of LNCS, pp. 319–327. Springer-Verlag, 1990, 21–25 August (1988). ISBN 978-0-387-34799-8. https://doi.org/10.1007/0-387-34799-2_25
European Central Bank: Annex 1: Functional and non-functional requirements linked to the market research for a potential digital euro implementation (2023). https://www.ecb.europa.eu/paym/digital_euro/investigation/profuse/shared/files/dedocs/ecb.dedocs230113_Annex_1_Digital_euro_market_research.en.pdf
Federal Reserve: Money and Payments: The U.S. Dollar in the Age of Digital Transformation (2022). https://www.federalreserve.gov/publications/files/money-and-payments-20220120.pdf
Kynge, J., Yu, S.: Virtual control: the agenda behind China’s new digital currency. Financial Times (2021). https://www.ft.com/content/7511809e-827e-4526-81ad-ae83f405f623
Locke, T.: Ray Dalio: The government outlawing bitcoin is a good probability (2021). https://www.cnbc.com/2021/03/26/bridgewaters-ray-dalio-good-probability-government-outlaws-bitcoin.html
Macheel, T.: Berkshire Annual Meetings: Warren Buffett gives his most expansive explanation for why he doesn’t believe in bitcoin (2022). https://www.cnbc.com/2022/04/30/warren-buffett-gives-his-most-expansive-explanation-for-why-he-doesnt-believe-in-bitcoin.html
Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system (2008). https://web.archive.org/web/20140320135003/https://bitcoin.org/bitcoin.pdf
Sharman, J.: The Money Laundry: Regulating Criminal Finance in the Global Economy. Cornell University Press (2011). ISBN 978-0801450181
Szabo, N.: Formalizing and securing relationships on public networks. First Monday 2(9) (1997). https://doi.org/10.5210/fm.v2i9.548
Waller, C.J.: CBDC: A Solution in Search of a Problem? (2021). https://www.bis.org/review/r210806a.pdf
White, A.D.: Fiat Money Inflation in France: How It Came, What It Brought, and How It Ended (1912). ISBN 978-1484834268. Reprinted 2013 in Burk Classics
Zhong, R.: China’s Halt of Ant’s IPO Is a Warning. The New York Times (2020). https://www.nytimes.com/2020/11/06/technology/china-ant-group-ipo.html
Zimmermann, P.R.: Testimony of Philip R. Zimmermann to the Subcommittee on Science, Technology, and Space of the US Senate Committee on Commerce, Science, and Transportation (1996). https://philzimmermann.com/EN/testimony/index.html
Acknowledgements
I am grateful to the workshop attendees who engaged in the discussion during my presentation and whose comments appear in the transcript that follows this paper in the post-proceedings volume, as well as to Virgil Gligor, Harry Halpin, Adrian Perrig and Andrei Serjantov for further offline comments and references that allowed me to improve the paper. Nonetheless, all the opinions herein expressed, as well as any mistakes or omissions, remain my sole responsibility.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Stajano, F. (2023). Sleepwalking into Disaster? Requirements Engineering for Digital Cash (Position Paper). In: Stajano, F., Matyáš, V., Christianson, B., Anderson, J. (eds) Security Protocols XXVIII. Security Protocols 2023. Lecture Notes in Computer Science, vol 14186. Springer, Cham. https://doi.org/10.1007/978-3-031-43033-6_1
Download citation
DOI: https://doi.org/10.1007/978-3-031-43033-6_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-43032-9
Online ISBN: 978-3-031-43033-6
eBook Packages: Computer ScienceComputer Science (R0)