{"id":383,"date":"2017-04-21T19:56:02","date_gmt":"2017-04-21T19:56:02","guid":{"rendered":"http:\/\/www.findthomas.net\/blog\/?p=383"},"modified":"2017-04-21T22:21:53","modified_gmt":"2017-04-21T22:21:53","slug":"confusing-existence-with-trust","status":"publish","type":"post","link":"http:\/\/www.findthomas.net\/blog\/2017\/04\/21\/confusing-existence-with-trust\/","title":{"rendered":"Public keys on blockchains: confusing existence with trust"},"content":{"rendered":"<p>Today Identity and Access Management (IAM) represents a core component of the Internet infrastructure, \u00a0without which users would not be able to obtain online services in a timely and scalable manner. Enterprise IAM infrastructures are well integrated into other enterprise infrastructure services &#8212; such as directory services &#8212; which provide control over employees and assets. In the case of Consumer IAM most end-users are oblivious to the underlying identity federation infrastructures that allow them to perform Web Single Sign-On (SSO) to various online services and which enables them to grant their mobile apps access to various personal resources (e.g. contacts list, calendar, etc).<\/p>\n<p>The recent emergence of the Bitcoin system has created various discourses of the role of &#8220;blockchain identity&#8221;. Here the three notable fundamental features of Bitcoin are its combined use of:<\/p>\n<ul>\n<li>peer-to-peer network of physically distributed mining nodes,<\/li>\n<li>consensus-based transaction status agreement algorithm and<\/li>\n<li>restrictive scripting language (opcodes) for transaction expression.<\/li>\n<\/ul>\n<p>These three aspects of the Bitcoin system provide mining nodes with true independence in processing transactions, subject only to the 51\\% majority requirement of the consensus scheme. It is precisely this node-independence that translates to &#8220;user independence&#8221; in the sense of the user not being beholden to any one mining node (or a small minority of nodes) in the Bitcoin system.<\/p>\n<p>However, it is this &#8220;user independence&#8221; (in the context of Bitcoin) that have led many to incorrectly extrapolate (speculate) that the same degree user independence can be achieved in all DLTs (distributed ledger technology) in general &#8212; something that is not necessarily true in DLTs generically speaking. The Bitcoin system is an instance of a DLT, but not all proposed DLTs possess the three fundamental features of Bitcoin.<\/p>\n<p>Furthermore, many commentators have equated &#8220;user independence&#8221; (in Bitcoin) to &#8220;individual empowerment&#8221; in DLTs in general, a jump in speculation that is too far and which have led to confusion among the non-technical audience.<\/p>\n<p>This misunderstanding regarding individual empowerment is exacerbated when the use of self-issued public-key pairs (in the Bitcoin system) is extrapolated to mean that these self-issued keys can be used as a &#8220;digital identity&#8221; for individuals in general. More specifically, the use of self-issued public-key pairs have led many to deduce (incorrectly) that a public-key used in the Bitcoin system can be &#8220;trusted&#8221; as a &#8220;digital identity&#8221; simply because it has been recorded on a transaction-block which has been replicated by all nodes on the peer-to-peer network.<\/p>\n<p>That is, the\u00a0<em>existence<\/em>\u00a0of a key in transaction block is being confused with <em>trust<\/em> in the provenance and ownership of that key.<\/p>\n<p>Some have even coined the term &#8220;trustless&#8221; when referring to the peer-to-peer network of mining nodes, forgetting that high-value transaction networks are built on both <em>technical-trust<\/em> and <em>legal-trust &#8212;\u00a0<\/em>both leading to business and social trust.<\/p>\n<p>It is worth recalling that this problem of digital identity versus public keys emerged first in the mid-1990s in the context of self-signed X509 certificates, \u00a0<em>Simple PKI<\/em> (<a href=\"https:\/\/www.ietf.org\/rfc\/rfc2693.txt\">RFC2693<\/a>) and in the <em>Pretty Good Privacy<\/em> (PGP) system (RFC1991). Although an implementation of the PGP system may provide technical-trust, the PGP proposal was never broadly adopted by industry due to a lack of a corresponding model for business and legal trust.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Today Identity and Access Management (IAM) represents a core component of the Internet infrastructure, \u00a0without which users would not be able to obtain online services in a timely and scalable manner. Enterprise IAM infrastructures are well integrated into other enterprise infrastructure services &#8212; such as directory services &#8212; which provide control over employees and assets. <a class=\"more-link\" href=\"http:\/\/www.findthomas.net\/blog\/2017\/04\/21\/confusing-existence-with-trust\/\">Read More<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":true,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[24,28,12],"tags":[31,29,30],"class_list":["post-383","post","type-post","status-publish","format-standard","hentry","category-blockchain-technology","category-identity","category-trust","tag-blockchain","tag-identity","tag-trust"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p2hk6w-6b","_links":{"self":[{"href":"http:\/\/www.findthomas.net\/blog\/wp-json\/wp\/v2\/posts\/383","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.findthomas.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.findthomas.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.findthomas.net\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/www.findthomas.net\/blog\/wp-json\/wp\/v2\/comments?post=383"}],"version-history":[{"count":7,"href":"http:\/\/www.findthomas.net\/blog\/wp-json\/wp\/v2\/posts\/383\/revisions"}],"predecessor-version":[{"id":390,"href":"http:\/\/www.findthomas.net\/blog\/wp-json\/wp\/v2\/posts\/383\/revisions\/390"}],"wp:attachment":[{"href":"http:\/\/www.findthomas.net\/blog\/wp-json\/wp\/v2\/media?parent=383"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.findthomas.net\/blog\/wp-json\/wp\/v2\/categories?post=383"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.findthomas.net\/blog\/wp-json\/wp\/v2\/tags?post=383"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}