Blockchain
Blockchain
Trustless Trust
Kevin Werbach
29,310 words
I. INTRODUCTION ...................................................................................... 1
II. UNPACKING TRUST ................................................................................ 6
A. Why Trust Matters .................................................................................... 6
B. What Trust Is ............................................................................................ 8
C. Trust Architectures ..................................................................................15
D. Trust and the Legal System......................................................................17
III. THE GREAT LEDGER IN THE SKY ......................................................... 20
A. How the Blockchain Works ......................................................................22
B. Reasons for Adoption ..............................................................................31
C. The Blockchain’s Trust Architecture .......................................................35
D. The Nature of Blockchain Trust ...............................................................39
IV. TRUSTLESS TRUST IN ACTION ............................................................. 47
A. Blockchain Applications ..........................................................................47
B. Ledgers Meet Law ....................................................................................53
C. Limitations and Dangers ..........................................................................60
V. FROM TRUST TO GOVERNANCE ........................................................... 68
A. Ghosts and the Machines .........................................................................68
B. The Social Contract .................................................................................71
C. Connecting Legal and Blockchain Trust ..................................................73
VI. CONCLUSION ......................................................................................... 77
I. INTRODUCTION
* Associate Professor of Legal Studies and Business Ethics, The Wharton School,
University of Pennsylvania. Email: werbach@wharton.upenn.edu. Thanks to Dan Hunter
for collaborating to develop the ideas that gave rise to this article, and to Sarah Light and
Patrick Murck for comments on prior drafts.
1President Ronald Reagan famously used this aphorism at the signing ceremony for
the Intermediate-Range Nuclear Forces treaty with the Soviet Union in 1987. Soviet
leader Mikhail Gorbachev remarked with exasperation, “You repeat that at every
meeting.” See DAVID E. HOFFMAN, THE DEAD HAND: THE UNTOLD STORY OF THE COLD WAR
ARMS RACE AND ITS DANGEROUS LEGACY 295 (Doubleday 2009).
2 There is not yet agreement on terminology. Technically, a blockchain (sometimes
rendered as block chain) is a data storage system using sequentially signed blocks, as
described in Part III. “The blockchain” may describe the universe of blockchains (similar
to “the internet”), the subset of public blockchains, or just the public ledger for Bitcoin.
“Distributed ledger” is a more general term for the primary application of blockchains.
For simplicity, this Article will employ “blockchain” for a specific implementation, and
“the blockchain” or “distributed ledgers” interchangeably for the overall approach.
3
A detailed explanation of how the blockchain achieves this paradoxical result is
provided in Part III.
4 See Juliana Nazaré, What We Learned From Designing an Academic Certificates
System on the Blockchain, MEDIUM (June 2, 2016), https://medium.com/mit-media-
lab/what-we-learned-from-designing-an-academic-certificates-system-on-the-
blockchain-34ba5874f196#.vstmqjsoq.
5See Ariel Ekblaw et al, MedRec: Medical Record Management on the Blockchain, J.
DESIGN & SCI. (forthcoming), http://jods.mitpress.mit.edu/pub/medrec.
6 See Michael del Castillo, Deloitte Uses Facebook to Build Warranties on Bitcoin
Blockchain, COINDESK (Apr. 29, 2016, 19:50 BST), http://www.coindesk.com/deloitte-
hacked-facebook-messenger-put-warranties-blockchain/.
7 See Better with Bitcoin, ECONOMIST (May 21, 2016),
http://www.economist.com/news/science-and-technology/21699099-blockchain-
technology-could-improve-reliability-medical-trials-better.
8 See Rob Price, This London Startup Could Make Diamond Theft a Thing of the Past --
and That's Just the Start, BUSINESS INSIDER (Aug. 28, 2015, 9:13 AM),
http://www.businessinsider.com/everledger-ledger-diamonds-blockchain-tech-theft-
fraud-2015-8?r=UK&IR=T.
9 See John Biggs, Ascribe Raises $2 Million to Ensure You Get Credit For Your Art,
TECHCRUNCH (June 24, 2015), https://techcrunch.com/2015/06/24/ascribe-raises-2-
million-to-ensure-you-get-credit-for-your-art/.
10
See infra Part III(A)(3).
11 Scott Rosenberg, Can an Arcane Crypto Ledger Replace Uber, Spotify and AirBnB?,
17 See generally JANE JACOBS, THE DEATH AND LIFE OF GREAT AMERICAN CITIES (1961)
(articulating the value of architecture to shape neighborhoods); Neal Katyal, Architecture
as Crime Control, 111 YALE L.J. 1039 (2002) (explaining how physical architecture affects
crime).
18 See Mark A. Lemley & Lawrence Lessig, The End of End-to-End: Preserving the
Architecture of the Internet in the Broadband Era, 48 UCLA L. REV. 925 (2001); Kevin
Werbach, The Architecture of Internet 2.0, RELEASE 1.0 (Feb. 19, 1999),
http://downloads.oreilly.com/radar/r1/02-99.pdf; BARBARA VAN SCHEWICK, INTERNET
ARCHITECTURE AND INNOVATION (2010).
19See Michael Casey, Blockchain Technology: Redefining Trust for a Global, Digital
Economy, LINKEDIN PULSE (June 13, 2016), https://www.linkedin.com/pulse/blockchain-
technology-redefining-trust-global-digital-michael-casey (describing the blockchain in
terms of “trust protocols”).
20 FRANCIS FUKUYAMA, TRUST: THE SOCIAL VIRTUES AND THE CREATION OF PROSPERITY
(1995).
21 NIKLAS LUHMANN, TRUST AND POWER (1979).
22 ALEXIS DE TOCQUEVILLE, DEMOCRACY IN AMERICA 492 (Harvey C. Mansfield & Delba
24
See infra Part II(B)(2); Elinor Ostrom, Beyond Markets and States: Polycentric
Governance of Complex Economic Systems, Nobel Prize Lecture (Dec. 8, 2009),
https://www.nobelprize.org/nobel_prizes/economic-
sciences/laureates/2009/ostrom_lecture.pdf. Peer-to-peer trust is my own coinage for
what Ostrom called design principles for governance of common-pool resources.
25
See Ostrom, supra note 24, at 408, 431-32 (emphasizing “the central role of trust in
coping with social dilemmas”).
26
See generally BRETT M. FRISCHMANN, INFRASTRUCTURE: THE SOCIAL VALUE OF SHARED
RESOURCES (Oxford University Press 2012) (applying Ostrom’s approach to management
of infrastructure); YOCHAI BENKLER, THE WEALTH OF NETWORKS (2006) (applying similar
concepts to “peer production” through digital networks).
Trustless Trust 6
As the first work of legal scholarship on the blockchain and trust, this Article
makes four significant contributions. First, it develops the novel concept of trust
architecture, which can be applied in many other contexts. Second, it explains
how the blockchain produces trust, making the phenomenon accessible to non-
technical scholars. Third, it identifies the benefits and limitations of the
blockchain’s trustless trust architecture. Fourth, it maps the intersections
between blockchain trust and law, showing how, surprisingly, the two
mechanisms are destined more for cooperation than opposition.
The Article proceeds as follows. Part II drills down on the meaning and
significance of trust. Part III provides a non-technical overview of blockchain
technology, and explains how it is being applied to create a new trust
architecture. Part IV examines the blockchain’s model of trustless trust,
describing both opportunities and dangers. Part V explains how law can aid in
the governance of the blockchain. Part VI concludes.
27 THOMAS HOBBES, LEVIATHAN, OR, THE MATTER, FORME, & POWER OF A COMMON-WEALTH
ECCLESIASTICALL AND CIVILL (1676). See also John Danaher, Blockchains and DAOs as the
Modern Leviathan, INSTITUTE FOR ETHICS AND EMERGING TECHNOLOGIES BLOG (March 31,
2016), http://ieet.org/index.php/IEET/more/Danaher20160331 (connecting Hobbes’ ideas
to the governance of blockchain-based DAOs). Hobbes did not actually use the term
“trust,” but his account is reflective of the concept as used here.
Trustless Trust 7
should I sign this contract? Should I accept a seller’s representations about the
value of this product? Should I type my credit card number into this box on my
computer screen? Whether we trust and how we trust both matter. There are few
human interactions, and fewer still business transactions, that do not in large
part depend on the qualities of trust involved.28
Two influential best-selling books around the turn of the millennium,
Francis Fukuyama’s Trust and Robert Putnam’s Bowling Alone, identified trust as
an essential factor in the success of societies. Putnam argued that the erosion of
local trust networks beyond the family, epitomized by the decline in bowling
leagues in America relative to individual bowling, was a pernicious development
explaining the growth of social pathologies.29 Fukuyama took a broader view,
comparing the performance of high-trust and low-trust societies around the
world.30 Those without strong social trust fared much worse.31 Business scholars
similarly find that companies where trust is high perform better.32
Trust as described by Putnam and Fukuyama is effectively equivalent to
social capital. It creates reserves of goodwill that lubricate social interactions,
thereby increasing the wealth of society as a whole.33 Without trust, every
interaction becomes a prisoners’ dilemma, which produces undesirable
outcomes for all involved. The difficulty lies in extending trust beyond the
narrow confines of family or small local communities. In the modern world, it is
simply not possible to limit interactions to those circles. High-trust societies
have developed cultures, social norms, and legal systems that give their citizens
the confidence to extend trust to strangers.
28 See Annette Baier, Trust and Antitrust, 96 ETHICS 231, 232 (1986) (arguing that "any
form of cooperative activity…requires the cooperators to trust one another…."); Arrow,
Gifts and Exchanges, in ALTRUISM, MORALITY, AND ECONOMIC THEORY 24 (E. Phelps ed. 1975)
(stating that "[v]irtually every commercial transaction has within itself an element of
trust.”); G. Richard Shell, Opportunism and Trust in the Negotiation of Commercial
Contracts: Toward a New Cause of Action, 44 VAND. L. REV. 221, 225-26 (1991) (observing
that “social psychologists, sociologists, economists, philosophers, and legal scholars all
have recognized that trust is central to the efficient coordination of human goals.”).
See ROBERT D. PUTNAM, BOWLING ALONE: THE COLLAPSE AND REVIVAL OF AMERICAN
29
COMMUNITY (2000).
30 See Fukuyama, supra note 20.
31 See id.
See Roger C. Mayer et al., An Integrative Model of Organizational Trust, 20 ACAD.
32
B. What Trust Is
Once the importance of trust is established, the next question is what trust
consists of. Trust is often invoked in discussions of the blockchain, but rarely
examined. If the meaning of trust were simple and widely accepted, casual use of
the term would not be problematic. Nothing could be further from the case.
Trust is one of those, “I know it when I see it” words that, upon closer
examination, becomes maddeningly difficult to pin down.38 Over the past few
34 See Luhmann, supra note 21; ERIC POSNER, LAW AND SOCIAL NORMS 54 (2000).
Conversely, limitations on trust result in higher transaction costs. See, e.g., Fairfield,
supra note 103, at 813 (explaining how the cost of trust limits online property).
35 See Ronald H. Coase, The Nature of the Firm, 4 ECONOMICA 386 (1937).
36 See Fukuyama, supra note 20.
37See TAMAR FRANKEL, TRUST AND HONESTY: AMERICA’S BUSINESS CULTURE AT A
CROSSROAD (2006).
38 See Margaret M. Blair & Lynn A. Stout, Trust, Trustworthiness, and the Behavioral
Foundations of Corporate Law, 149 U. PENN. L. REV. 1735, 1745 (2001) (observing that
scholars use “the term ‘trust’ in different ways to mean different things”); Rebecca M.
Bratspies, Regulatory Trust, 51 ARIZ. L. REV. 575, 588-89 (2009) (noting with surprise
trust’s “continued elusiveness”); Mayer et al, supra note 32, at 709 (identifying problems
in defining the term); ROBERT C. SOLOMON & FERNANDO FLORES, BUILDING TRUST: IN
BUSINESS, POLITICS, RELATIONSHIPS, AND LIFE 20 (2001) (suggesting there is no single
paradigm case of trust); Gregory A. Bigley & Jane L. Pearce, Straining for Shared Meaning
in Organization Science: Problems of Trust and Distrust, 23 ACAD. MGMT. REV. 405 (1998).
Trustless Trust 9
Fukuyama calls trust “the expectation that arises within [a] community of
regular and honest behavior based on shared norms, such as truth-telling, good
intentions, reciprocity, and competence.”42 How, though, does that expectation
arise in individuals? What produces the positive disposition that Mayer et al
describe? There is a cognitive and an affective dimension.43 In other words, trust
39Cross, supra note 33, at 1459 (“Much has been written on trust in various academic
disciplines, such as philosophy, business, psychology, political science, and law.”).
40 Dominic Frisby, In Proof We Trust, AEON (Apr. 21, 2016),
https://aeon.co/essays/how-blockchain-will-revolutionise-far-more-than-money.
41See Mayer et al, supra note 38, at 712 (“The definition of trust proposed in this
research is the willingness of a party to be vulnerable to the actions of another party
based on the expectation that the other will perform a particular action important to the
trustor, irrespective of the ability to monitor or control that other party.”).
42 Fukuyama, supra note 20, at 26.
43 See Cross, supra note 33, at 1463; J.L. Morrow, et al, The Cognitive and Affective
Antecedents of General Trust Within Cooperative Organizations, 16 J. MANAGERIAL ISSUES,
48, 50 (2004).
Trustless Trust 10
44See Cross, supra note 33, at 1469 (observing that “any individual instance of trust
probably contains both affective and cognitive components.”).
See id. at 1466 (“Cognitive trust requires an assessment of the probability and
45
50See Cross, supra note 33, at 1464; Karen Jones, Trust as an Affective Attitude, 107
ETHICS 4, 5-6 (1996).
51 See Baier, supra note 28, at 231, 235 (“When I trust another, I depend on her good
will toward me.”).
52See Morrow et al, supra note 43, at 50. See also Larry E. Ribstein, Law v. Trust, 81
B.U. L. REV. 553, 557 (2001) (arguing for a definition of trustworthiness not based on
external constraints to honor commitments).
53 See Lawrence Becker, Trust as Noncognitive Security About Motives, 107 ETHICS 34
(1996); Tom R. Tyler, Trust and Law Abidingness: A Proactive Model of Social Regulation,
81 B. U. L. REV. 351 (2001). See also Blair & Stout, supra note 38, at 1751 (describing
“internalized trust” based on “expectations of intrinsic trustworthiness” rather than
external incentives).
54J. David Lewis & Andrew Weigert, Trust as a Social Reality, 63 SOCIAL FORCES 967
(1985).
55Andrew C. Wicks et al., The Structure of Optimal Trust: Moral and Strategic
Implications, 24 ACAD. MGMT. REV. 99, 100 (1999); Cross, supra note 33, at 1464.
56 Putnam, supra note 29, at 137.
57 Fukuyama, supra note 20, at 26. See also William Galston, Trust--But quantify--
Trust: The Social Virtues and the Creation of Prosperity by Francis Fukuyama, PUBLIC
INTEREST, Winter 1996, at 129.
58 THOMAS HOBBES, LEVIATHAN (Richard Tuck, ed., 1991) at X.27.
Trustless Trust 12
on verifying, clearly you don’t trust.”59 Yet this is not necessarily the case. Trust
is a willingness to act; it need not involve blind faith.60 If one sees trust in
cognitive, game-theoretic terms, verification may well be a good investment. In
an iterative game, for example, one may trust initially but seek verification
before trusting again. On the other hand, a desire for monitoring or verification
may be fatal to affective trust.61 If you feel the need to monitor, you probably
don’t have an optimistic disposition toward me.
Vulnerability
59 Barton Swaim, “Trust, But Verify”: An Untrustworthy Political Phrase, WASH. POST
which wisdom and experience temper both the naivete of affective trust and the coldness
of cognitive trust. See Solomon & Flores, supra note 38, at 54.
61 See Cross, supra note 33, at 1466 and n.43; Bigley & Pierce, supra note 38, at 411-
12.
See Mayer et al, supra note 32; Denise M. Rousseau et al., Not So Different After All:
62
A Cross-Discipline View of Trust, 23 ACAD. MGMT. REV. 393, 394 (1998); Helen
Nissenbaum, Will Security Enhance Trust Online, or Supplant It,” in TRUST AND DISTRUST IN
ORGANIZATIONS: DILEMMAS AND APPROACHES 155, 173 (Roderick M. Kramer and Karen S.
Cook, eds., 2004) (“The theories of trust I have studied differ from one another in many
ways; cutting across these differences, however, is a common theme linking trust with
vulnerability.”).
63Baier, supra note 28, at 240 (arguing that "any form of cooperative
activity…requires the cooperators to trust one another….").
Trustless Trust 13
defection.”64 Emphasizing this point, the legal scholar Gus Hurwitz pithily
defines trust as, “reliance without recourse.”65
On implication of this vulnerability is that sometimes trust is misplaced.
Trust can break down in three ways: direct violations, opportunistic behavior,
and systemic failures. Violations of trust are the clearest cases. The confidence
man who takes advantage of the mark; the Uber driver who sexually assaults a
passenger; the mechanic who charges for unnecessary work: Each takes
advantage of the trustor’s vulnerability to cause him or her harm.
Opportunism means violating the spirit but not necessarily the letter of an
agreement, by taking advantage of asymmetric information.66 The opportunist is
untrustworthy because he or she takes advantage of the trustor, rather than
exercise the necessary benevolence. Policing opportunistic behavior is a central
goal of corporate law under the contemporary mainstream theory of the firm.
Corporate governance responds to the potential for opportunism in the
principal/agent relationship between shareholders and managers.67 Courts have
used several legal doctrines to address opportunism in contractual transactions,
with mixed success.68
Finally, trust may fail, not because the parties to an arrangement are
necessarily untrustworthy, but because the environment is inimical to trust. This
is the case in countries without a robust rule of law or property rights.69 It may
also occur when relationships cross too many boundaries, whether
organizational or political. Without a common legal environment or business
structure, the transaction costs of establishing baselines for trust may be too
great.
A common response to these impediments creates its own problems of trust.
Large private firms are able to internalize the trust environment that otherwise
would depend on public institutions or arrangements across organizational
boundaries. This makes it easier for parties to engage in trusted transactions, but
it also makes those corporate intermediaries more powerful. Eventually, as in
the 2008 financial crisis, they may become “too big to fail,” and thus part of the
problem rather than the solution to the breakdown of trust.
Trustworthiness
Trust is not the same as trustworthiness.70 One who trusts acts as though the
trusted party is trustworthy, but that may or may not be the case. Furthermore,
as Barney and Hansen observe, “trust is an attribute of a relationship between
exchange partners, trustworthiness is an attribute of individual exchange
partners.”71 Hierarchical trust architectures falter when they enable trusting
transactions without establishing trustworthiness beyond the thin level of
cognitive cost/benefit. Trustworthiness also becomes a difficult concept when
one exchange partner is a machine, or a machine-based system such as a
blockchain.
According to Mayer et al, trustworthiness has three aspects: benevolence,
ability, and integrity.72 Mirroring the optimistic expectations of the trustee, one
must endeavor to act in his or her best interests. The trustworthy actor must also
have the requisite capability. The good Samaritan is not trusted to provide the
same level of medical care as the trained medical professional (although they
must exercise a basic level of care). Finally, integrity means that the trustor
perceives that the trustee adheres to an appropriate set of principles.
Trustworthiness cannot be communicated directly. Saying, “trust me,” gives
no indication in itself that one is trustworthy. Proxies must be used instead. One
proxy for trustworthiness is familiarity. A pre-existing relationship is likely to
enhance trust,73 as are shared cultural attributes or histories.74 Homophily and
70 See Russell Hardin, Trustworthiness, 107 ETHICS 26, 28 (1996); Avner Ben-Ner and
C. Trust Architectures
75
See Hurwitz, supra note 65, at 1580-81.
76 See UBS, BUILDING THE TRUST ENGINE 9,
https://www.ubs.com/microsites/blockchain-report/en/home/ [hereinafter Building the
Trust Engine] (“Banks arose from the need for trusted intermediaries to help people
protect and transact with their money.”); Andreas Adriano and Hunter Monroe, The
Internet of Trust, FINANCE & DEVELOPMENT, June 2016,
http://www.imf.org/external/pubs/ft/fandd/2016/06/adriano.htm (“Traditionally, the
financial industry has tried to solve the problem of creating trust by acting as a trusted
intermediary between individuals and companies who do not know each other, with
Trustless Trust 16
structure, the formal rules of the intermediaries take the place of immanent
social norms to structure transactions. The system is hierarchical because it
generally follows a hub-and-spoke model.77 Individuals trust a local
intermediary, which develops trusted relationships with its peers, and which
derives its authority from higher-level intermediaries, all the way up to the
state. The hierarchical trust architecture gives rise to a trust tradeoff, in which
users are forced to give up freedom to gain the benefits of trust.78
Hierarchical trust expands the second dimension of trust—its radius—at the
cost of limiting the others. Intermediaries are generally trusted for limited
purposes. You may believe Facebook will keep your personal information secure
from theft, but that doesn't make you confident it will be a good steward of your
privacy. And trust in the hierarchy of intermediaries tends to be highly
instrumental. You trust the bank because you think the risks to your money are
limited relative to the benefits, not because you believe in the bank’s goodwill
toward you.
The second architecture, peer-to-peer trust, is based on interpersonal
relationships and shared ethical norms: I trust you because I trust you. This is
the domain of commons regimes explored by Elinor Ostrom, Robert Ellickson,
and others, where order is achievable without law.79 Well-articulated social
norms and standards, plus concern about reputation, is enough. Because it
operates peer-to-peer within communities, this trust architecture has a
relatively small radius. You might trust a stranger peer-to-peer (the purchase at
the convenience store), but only for an unimportant transaction.
central banks and regulators backing up this trust by supervising banks and through
deposit insurance.”)
77In a seminal paper, Paul Baran, the RAND network engineer who did foundational
work on packet switching in the 1960s, distinguished two kinds of networks: centralized
and distributed. See Paul Baran, On Distributed Communications Networks, 12 IEEE
TRANSACTIONS ON COMMUNICATIONS SYSTEMS, 1 (1964). In practice, he noted, most
communications networks involve a hub-and-spoke combination of the two, which he
labeled decentralized. See id. See also Casey, supra note 19 (“A hub-and-spokes structure
emerged, with a centralized ledger managed by the central bank acting as a trust
backstop for the multitude of subordinate commercial bank ledgers, where most of
society’s monetary balances remained.”).
78See Hurwitz, supra note 75, at 1581 (arguing that, “[i]n the post-trust Internet,
intermediaries can cause real harm.”).
79See ELINOR OSTROM, GOVERNING THE COMMONS: THE EVOLUTION OF INSTITUTIONS FOR
COLLECTIVE ACTION (1990); ROBERT ELLICKSON, ORDER WITHOUT LAW: HOW NEIGHBORS SETTLE
DISPUTES (1991).
Trustless Trust 17
involves some risk.85 The legal enforcement mechanism may reduce the
possibility and magnitude of loss from untrustworthiness enough to induce
trust-based relationships.86 Moreover, law formalizes relationships. Knowing the
scope of expectations on both sides, and placing the entire arrangement within a
structure, can limit room for misunderstandings.87 Thus, even though legal
enforcement rests on the Leviathan of state power, law may create necessary
space for the informal arrangements of peer-to-peer trust.
On the other hand, legal enforcement may actually reduce trust.88 Critics of
the American legal system argue that the expansive use of law and lawyers
undermines social cohesion.89 The formalization that law imposes may replace
the fluidity of normal human relationships with dry commitments.90 And while
legal redress may make trust less risky, it may also stifle trust-enhancing
actions, leaving the parties worse off.91 In fact, trusting purely on a calculating
basis may not be trust at all.92 On this view, trust inures in relationships.
138 (1994); PHILIP K. HOWARD, THE DEATH OF COMMON SENSE: HOW LAW IS SUFFOCATING
AMERICA (1994); ROBERT A. KAGAN, ADVERSARIAL LEGALISM: THE AMERICAN WAY OF LAW
(2001); Charles Silver & Frank B. Cross, What’s Not To Like About Being a Lawyer?, 109
YALE L.J. 1443, 1443-46 (2000) (reviewing various critiques of the legal system).
90See Cross, supra note 33, at 1483 (“Commentators increasingly blame the law and
lawyers for America’s reported diminution of trust and social capital.”); Deepak
Malhotra and J. Keith Murnighan, The Effects of Contracts on Interpersonal Trust, 47
Admin. Sci. Q. 534 (2002); Laetitia B. Mulder et al, Undermining Trust and Cooperation:
The Paradox of Sanctioning Systems in Social Dilemmas, 42 J. EXPERIMENTAL SOC. PSYCH. 147
(2006); David Charny, Nonlegal Sanctions in Commercial Relationships, 104 HARV. L. REV.
373, 426-30 (1990); Sitkin & Roth, supra note 84, at 369.
91 See Charny, supra note 90, at 428; Ribstein, supra note 52, at 581-83.
92See Oliver E. Williamson, Calculativeness, Trust, and Economic Organization, 36 J.L.
& ECON. 453, 463 (1993) (“[I]t... can be misleading to use the term ‘trust’ to describe
commercial exchange for which cost-effective safeguards have been devised in support
of more efficient exchange….”).
Trustless Trust 19
93 See Fernando L. Flores & Robert C. Solomon, Rethinking Trust, 16 BUS. & PROF.
ETHICS J. 47, 50 (1997). Law and economics scholars of relational contracts emphasize the
importance of ongoing business relationships over enforcement of formal contractual
terms. See Cross, supra note 33, at 1485. On this view, contract law exists to restrain
opportunism, see supra note 66 and associated text, but business negotiations and other
relationship-enhancing activities outside the contract itself are the primary means of
achieving this goal. See Cross, supra note 33, at 1485-86; Robert W. Gordon, Macaulay,
Macneil, and the Discovery of Solidarity and Power in Contract Law, 1985 WISC. L. REV. 565,
573; Simon Deakin et al., Contract Law, Trust Relations, and Incentives for Cooperation: A
Comparative Study, in CONTRACTS, CO-OPERATION, AND COMPETITION 105 (Simon Deakin &
Jonathan Michie eds., 1997).
94 See Frankel, supra note 37, at 474 (describing the cognitive trust benefits of the
law).
95 See Mark A. Hall, Law, Medicine, and Trust, 55 STAN. L. REV. 463, 514 (2002)
(expressing concern that “trust in the system of law replaces interpersonal trust in
individuals”).
96 See Cross, supra note 33, at 1499.
97 See id. at 1508-09.
Trustless Trust 20
98 See, e.g., Marc Andreesen, Why Bitcoin Matters, N.Y. TIMES DEALBOOK (Jan. 21, 2014,
if Bitcoin fails spectacularly, the impact of the blockchain will be felt in industry
after industry.
It all starts with the humble ledger.
Distributed Ledgers
A ledger is a record of accounts. Perhaps the most familiar ledgers are those
used for double-entry bookkeeping, the foundation of accounting. However,
ledgers are not limited to recording debits and credits for corporate balance
sheets. Real estate markets could not exist without land title registries.
Democracy requires ledgers tallying votes. Copyright depends on both public
and private records tracking the registration and assignment of rights. The
modern firm depends on ledgers not just for its financials, but for the
relationships among its internal agents and external partners, as well as its
supply chain, back-office, and customer-facing activities. And these are just a
few examples. Sociologists such as Max Weber and Werner Sombart argue that
double-entry bookkeeping was the foundation of modern capitalism. In Weber’s
words, “the most general presupposition for the existence of this present-day
capitalism is that of rational capital accounting...."107
One of the reasons ledgers are so powerful is that they are foundational
infrastructure for keeping track of things.108 By establishing a reliable record of
ownership and asset flows, they strengthen property rights. They also allow such
rights to be subdivided and transacted in increasingly sophisticated ways. And
by tracking rights and obligations, they also support potentially complex
contractual agreements. Standards such as Generally Accepted Accounting
Principles (GAAP) can be adopted on top of the ledgers, and then
107 MAX WEBER, GENERAL ECONOMIC HISTORY 276 (Trans. Frank H Knight, 1927). See
also WERNER SOMBART, DER MODERNE KAPITALISMUS 23 (1916) (“capitalism and double
entry bookkeeping are absolutely indissociable; their relationship to each other is that of
form to content”). See also Quinn DuPont and Bill Maurer, Ledgers and Law in the
Blockchain, KING’S REVIEW (June 23, 2016),
http://kingsreview.co.uk/magazine/blog/2015/06/23/ledgers-and-law-in-the-blockchain/
(detailing the significance of ledgers and the implications for the blockchain). Going
back even further, many of the earliest surviving written documents from antiquity, in
Mesopotamian cuneiform, are ledgers of commercial transactions. See HANS J. NISSEN,
PETER DAMEROW, AND ROBERT K. ENGLUND, ARCHAIC BOOKKEEPING: EARLY WRITING AND
TECHNIQUES OF ECONOMIC ADMINISTRATION IN THE ANCIENT NEAR EAST (Univ. of Chicago
Press 1993).
108 See Frisby, supra note 40.
Trustless Trust 23
Nakamoto Consensus
The blockchain was first described in a paper published online in late 2008 by
someone (or some group) using the pseudonym Satoshi Nakamoto.111 It was
109 See UK Government Chief Science Advisor, supra note 98; PAUL VIGNA & MICHAEL
J. CASEY, THE AGE OF CRYPTOCURRENCY: HOW BITCOIN AND DIGITAL MONEY ARE CHALLENGING
THE GLOBAL ECONOMIC ORDER 124 (2015). Not all distributed ledgers are structured as
blockchains. For example, the Corda system for financial agreements between regulated
banks uses a different data structure. See Richard Gendal Brown, Introducing R3
Corda(TM): A Distributed Ledger Designed for Financial Services, Richard Gendal Brown
blog (April 5, 2016), https://gendal.me/2016/04/05/introducing-r3-corda-a-distributed-
ledger-designed-for-financial-services/. Blockchains are the most common approach,
especially for public (“permissionless”) systems, so that is the term used here.
110 Albert Wenger, Bitcoin: Clarifying the Foundational Innovation of the Blockchain,
Continuations (Dec. 15, 2014), http://continuations.com/post/105272022635/bitcoin-
clarifying-the-foundational-innovation-of.
111Nakamoto, supra note 104. Nakamoto’s identity has never been conclusively
revealed.
Trustless Trust 24
There remain many important questions about Bitcoin’s economic and legal
viability as a currency. The greater significance of Nakamoto’s invention,
however, lies in the architecture of distributed ledgers needed to make Bitcoin a
reality.118 And the most fundamental question for legal scholars is how those
ledgers may themselves usurp the roles of state-backed law.
At the heart of Bitcoin is a set of protocols often called Nakamoto
Consensus.119 Consensus means that participants in a network have confidence
that what they see on their ledgers is accurate and consistent.120 Without a
robust means of ensuring consensus, any Bitcoin participant could, for example,
spend the same Bitcoins multiple times (known as the double-spend problem),
or claim it had more currency than it really did. The trouble with most
approaches to consensus on digital systems is that it’s easy to create a nearly
infinite number of fake network nodes (known as a Sybil attack).121 Even if most
real users are honest, an attacker can create enough nodes to dominate the
network and impose its own false consensus on the system. This challenge is
well-known in cryptography and referred to as the Byzantine Generals
Problem.122 Until Bitcoin, it had no scalable solutions.
Nakamoto’s answer cleverly combined cryptographic techniques with an
insight from game theory.123 The basic approach is called a Byzantine Fault
Tolerant protocol. Instead of trusting an individual actor, you trust a network of
actors, who express themselves through voting.124 In Nakamoto’s version, these
actors engage in a process known as mining, through which they validate and
establish consensus over chunks of Bitcoin transactions.125 Every full node sees
every transaction, and there is only one consensus ledger mirrored across every
machine on the network. Even if some of the miners are untrustworthy, the
system holds so long as the majority is honest.
The major limitation of such a protocol is the possibility of Sybil attacks: If
it’s easy and rewarding to be untrustworthy, someone probably will be. Hence
the second cryptographic technique in Bitcoin: proof of work.126 Proof of work
121 See John R. Douceur, The Sybil Attack, IPTPS ’01 Revised Papers from the First
International Workshop on Peer-to-Peer Systems 251 (2002),
http://nakamotoinstitute.org/static/docs/the-sybil-attack.pdf
122 See Leslie Lamport, Robert Shostak, & Marshall Pesce, The Byzantine Generals
Problem, 4.3 ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS 382 (1982). The
name refers to a hypothetical scenario where a group of generals from the Byzantine
Empire are surrounding a city, but cannot effectively coordinate their actions.
123 Others described similar approaches in the same time frame, although none
achieved consensus in as robust a way. For example, cryptographer Nick Szabo, a strong
candidate as the real Satoshi Nakamoto, propounded a system called BitGold. Nick
Szabo, Liar-Resistant Government, UNENUMERATED (May 7, 2009)
http://unenumerated.blogspot.com/2009/05/liar-resistant-government.html.
124 This approach is analogous to the republican form of government epitomized by
the United States. Instead of empowering a king, power is decentralized to the people,
who express it through voting. To mediate the potential for factionalism and mob rule,
voters exercise power indirectly, by electing representatives.
125 Bitcoin: The Magic of Mining, ECONOMIST, Jan. 10, 2015, at 58,
http://www.economist.com/node/2163812; ANDREAS M. ANTONOPOULOS, MASTERING
BITCOIN: UNLOCKING DIGITAL CRYPTOCURRENCIES (2014). See also Kevin Werbach, Bitcoin is
Gamification, MEDIUM, (Aug. 5, 2014), https://medium.com/@kwerb/bitcoin-is-
gamification-e85c6a6eea22 (explaining the significance of the motivational system to
Bitcoin).
126See Narayanan et al, supra note 98, at 266. Not every blockchain implements proof
of work in the same manner as Bitcoin. For example, Ethereum uses a modified
Trustless Trust 27
makes voting costly. Bitcoin’s proof of work system requires miners to solve
cryptographic puzzles involving one-way functions known as hashes.127 Votes
require massive and growing computing power, which is sufficiently expensive
to deter Sybil attacks.128 The benefits of cheating are less than the costs.
Nakamoto Consensus affirms the integrity both of each individual
transaction, and of the ledger as a whole. It does so by aggregating together
transactions into blocks.129 The proof of work system is tuned dynamically to
generate a valid solution to the hashing puzzle for a block roughly once every
ten minutes.130 Each block thus validated is cryptographically signed with the
hash of the prior block, creating an immutable chain of sequential blocks. The
longest chain of blocks represents the consensus state of the system.131 Only an
attacker with a majority of total computing power in the entire network (known
as a 51-percent attack) can “fork” the longest chain with a fraudulent block.132
algorithm so that miners do not gain an advantage from using custom chips, known as
ASICs. Other distributed ledger platforms such as Ripple and Tendermint do not employ
proof of work at all, but instead implement alternate mechanisms to achieve the same
goal. See Bonneau et al, supra note 119. It remains to be seen whether these other
consensus protocols are as successful as Bitcoin’s proof of work. See id.
127 A hash function takes some input string (such as a document file) and turns it
into an output string—the hash—with a specified length. Although in theory multiple
input strings could map to the same hash, cryptographic hash spaces are sufficiently
large that such “collisions” are infinitesimally rare. It is easy to compute the hash
function of any file. An input string will produce the same output string every time.
However, there is no known way to go from a hash back to the original other than trial
and error. See Narayanan et al, supra note 98, at 23-24. Miners must attempt truly vast
numbers of hashes to find the one that produced the specified output. See id. at 61-68.
128
The Bitcoin network today is thousands of times more powerful than the world’s
500 most powerful supercomputers combined. See Laura Shin, Bitcoin Production Will
Drop By Half In July, How Will That Affect The Price?, FORBES (May 24, 2016, 7:30am),
http://www.forbes.com/sites/laurashin/2016/05/24/bitcoin-production-will-drop-by-
half-in-july-how-will-that-affect-the-price/#46f73a5499e1. The computing power
involved is so vast that it raises concerns about the environmental impacts of the
electricity required to power and cool the data centers involved. See Tapscott &
Tapscott, supra note 98, at 259-63.
129 See Narayanan et al, supra note 98, at 88-90
130 See id. at 65.
131 See id. at 59. More precisely, it is the chain with the most proof of work.
132
Some research suggests an attacker with one-third of the mining power could
disrupt the network. However, this still represents an extremely high threshold.
Trustless Trust 28
133 Users are identified on the blockchain through digital signatures, so the real-
world identity of the parties to a transaction may be impossible to determine. For those
desiring further anonymity, there are ways to break up transactions in order to obscure
large transfers.
134 Alec Liu, Who’s Building Bitcoin? An Inside Look at Bitcoin's Open Source
Development, MOTHERBOARD (May 7, 2013, 12:20pm EST),
http://motherboard.vice.com/blog/whos-building-bitcoin-an-inside-look-at-bitcoins-
open-source-development.
135 The Bitcoin system records transactions, not asset holdings. This makes it
difficult to “walk back” account balances even if a majority of miners change their
Bitcoin software to unwind the validation of a particular block. Some other
cryptocurrency platforms are easier to “hard fork” so as to revert prior transactions. The
Ethereum community did so in July 2016 to address the theft of currency from a
crowdfunding platform called The DAO. See infra TAN 320-321. Such steps are
controversial, because they call into question the censorship resistance and immutability
of public blockchains.
136See Andreessen, supra note 98; Morgen E. Peck, The Future of the Web Looks a Lot
Like Bitcoin, IEEE SPECTRUM (July 1, 2015),
http://spectrum.ieee.org/computing/networks/the-future-of-the-web-looks-a-lot-like-
bitcoin.
137Lawrence Lessig, Deja Vú All Over Again: Thinking Through Law & Code, Again,
VIMEO, https://vimeo.com/148665401.
Trustless Trust 29
central bank. New Bitcoins are only created through the reward mechanism, at a
rate that declines over time.138 Miners thus act purely out of self-interest, but in
doing so, they fulfill a socially beneficial role.
Bitcoins are thus both the output and input of the system. One could equally
well describe Bitcoin as a trust infrastructure designed to support a digital
currency, or a digital currency designed to support a trust infrastructure. While
the Bitcoin currency remains a substantial area of activity, non-currency
applications of distributed ledgers (sometimes called Bitcoin 2.0) are growing
rapidly.139 According to the research and publishing firm CoinDesk, venture
capital investments in blockchain startups exceeded those of Bitcoin-focused
startups for the first time in the first quarter of 2016.140
Some of the blockchain companies use the Bitcoin ledger and proof of work
system, but add additional functionality through a variety of mechanisms.
Others create separate blockchains using variations of Nakamoto Consensus or
different distributed consensus protocols.141 While the Bitcoin blockchain is
open to all, some of the others are “permissioned,” meaning that only
authorized users or organizations can participate.142 The Bitcoin blockchain
remains the most popular, with the most valuable currency, but there is no
138 Hence the analogy to mining for previous resources in the physical world.
Eventually the block rewards will drop to zero. At that point the number of Bitcoins in
circulation will be fixed at 21 million. Nakamoto envisioned that voluntary transaction
fees paid to miners by those seeking validation would gradually replace the rewards as
adoption of the Bitcoin system grew. This remains to be seen.
139 See Jon Evans, Bitcoin 2.0: Sidechains And Ethereum And Zerocash, Oh My!,
TECHCRUNCH (Oct. 25, 2015), https://techcrunch.com/2014/10/25/bitcoin-2-0-sidechains-
and-zerocash-and-ethereum-oh-my/.
140 Olga Kharif, Blockchain Goes Beyond Crypto-Currency, BLOOMBERG BUSINESSWEEK,
(May 19, 2016, 2:17pm EDT), http://www.bloomberg.com/news/articles/2016-05-
19/built-for-bitcoin-blockchain-goes-beyond-crypto-currency
141 See Antonopoulos, supra note 125, at 221-23.
142 See Tim Swanson, Consensus-As-a-Service: a Brief Report on the Emergence of
Permissioned, Distributed Ledger Systems (Apr. 6, 2015),
http://www.ofnumbers.com/wp-content/uploads/2015/04/Permissioned-distributed-
ledgers.pdf. Richard Gendal Brown of the financial industry blockchain consortium R3
ECV maps consensus along two dimensions: whom you trust, and what you trust them
about. See Richard Gendal Brown, A Simple Model to Make Sense of the Proliferation of
Distributed Ledger, Smart Contract and Cryptocurrency Projects, RICHARD GENDAL BROWN
Blog (Dec. 19, 2014), https://gendal.me/2014/12/19/a-simple-model-to-make-sense-of-
the-proliferation-of-distributed-ledger-smart-contract-and-cryptocurrency-projects/.
Trustless Trust 30
Distributed ledgers are active, not passive. In other words, they do not
simply record information passed to them. They are part of a consensus system,
so they must ensure that recorded transactions are actually completed to match
the consensus.143 For Bitcoin, that means the system self-enforces financial
transfers.144 I can’t initiate a transaction promising to send you Bitcoin and then
renege; the synchronization that reconciles and completes the transfer is part of
the process. This mechanism is known as a smart contract.145 Both the
specification of rights and obligations, and the execution of that contractual
agreement, occur through the platform.
The idea of smart contracts was introduced independently from blockchains,
and well before Bitcoin was developed.146 Its practical relevance was limited,
however, until Nakamoto’s synthesis. Bitcoin takes advantage of smart contracts
to execute transactions, and smart contracts take advantage of Bitcoin’s
distributed ledger to operate with autonomy.
The Bitcoin protocol allows for very limited smart contracts. It was designed
explicitly for a currency, so it only needed the functionality necessary to support
financial transactions. Adding richer programming capabilities to blockchain
transactions adds security risks and various other complexities. On the other
hand, a smart contract engine on the blockchain creates enticing possibilities. In
143
Bitcoin actually uses a scripting language for transactions, meaning that every
transfer is actually running software code on the blockchain. See Narayanan et al, supra
note 98, at 79-88 (describing the Bitcoin scripting language and some applications
beyond basic cash transfers).
144 To be precise, the blockchain records challenges and responses that either create
or destroy Bitcoins, rather than transfers of discrete tokens as such. See Narayanan et al,
supra note 98, at 75-76.
145See Nick Szabo, Formalizing and Securing Relationships on Public Networks, 2 FIRST
MONDAY (1997), http://ojphi.org/ojs/index.php/fm/article/view/548; TIM SWANSON, GREAT
CHAIN OF NUMBERS: A GUIDE TO SMART CONTRACTS, SMART PROPERTY AND TRUSTLESS ASSET
MANAGEMENT 67 (2014); Nick Szabo, The Idea of Smart Contracts (1997),
http://szabo.best.vwh.net/smart_contracts_idea.html; Wright & De Filippi, supra note
102, at 24-26.
146 See Szabo, supra note 145.
Trustless Trust 31
If distributed ledgers did not solve real-world problems, trustless trust would
be of interest only to cryptographers or philosophers. While some adoption is
driven by ideological desire to circumvent state control, the entrepreneurs,
established corporations, major financial institutions, and governments
investigating the blockchain today are pursuing tangible benefits. The two
Untrustworthy Actors
Trusting imposes risk. There is always the danger that one you trust turns
out to be untrustworthy. Investors in Bernie Madoff’s Ponzi scheme lost their
money because they trusted the wrong investment manager. Law, regulation,
and insurance are all mechanisms to limit such risks. The Madoff scenario is the
exception rather than the rule, at least in the United States.
For those at the mercy of loan sharks, payday lenders, or extortionate money
transfer agents, however, the blockchain offers an appealing alternative. In
countries without a strong adherence to the rule of law, the government itself
may not be trustworthy. In such cases, the availability of a financial
infrastructure that doesn’t rely at its root on sovereign authority is a powerful
opportunity.151 And the unbanked may not have access to trusted financial
institutions at all. The blockchain as a trust platform requires only an internet
connection and a computer, so it can go all sorts of places where the current
financial system does not.152
It is ironic to consider the blockchain as a tool to combat bad actors, given
the somewhat unsavory reputation of Bitcoin. One obvious use for a global
currency outside the control of governments and the banking system is illicit
activity. The Bitcoin-based marketplace Silk Road, which was used primarily for
transactions involving drugs and other contraband, is the most spectacular
example.153 In addition, because Bitcoin doesn’t require any proof of real-world
identity, it can evade anti-money laundering (AML) controls and Know Your
151 See Abramowicz, supra note 102, at 365 (describing the potential of
“cryptocurrency-based law” where traditional legal regimes break down). This is not just
an issue for the developing world. Lawrence Lessig, who argues that the current
campaign finance system in the United States undermines democracy, advocated for the
blockchain at a recent conference by stating, “We need technology to eliminate the need
for trust in a world wrecked by corruption.” Lessig, supra note 137.
152Using the blockchain as a bank end, consumer-facing virtual wallet and financial
application providers can lower the cost and complexity for users even further. The
tradeoff is those intermediaries must be trusted in the same manner as traditional banks,
but this just puts the unbanked on an equal footing to most of the world.
153See Joshuah Bearman, The Rise and Fall of Silk Road: Part I, WIRED (Apr. 2015),
http://www.wired.com/2015/04/silk-road-1; Joshuah Bearman, The Rise and Fall of Silk
Road: Part II, WIRED (May 2015), http://www.wired.com/2015/05/silk-road-2.
Trustless Trust 33
The second appealing aspect of the blockchain’s trustless trust model is its
potential for speed and efficiency. At first glance, this sounds odd. Bitcoin
validates a block every ten minutes, and currently has a limit of seven
transactions per second. This is quite a small number: The Visa credit card
network handles up to 10,000 transactions in the same period.160 The overhead
of synchronizing the distributed ledger is so great that, according to one
estimate by cryptographer Nick Szabo, the process operates 10,000 times slower
than a conventional computer.161
Yet there is a hidden advantage of removing the need to trust the specific
actors you interact with. Trust is not transitive. I may trust my bank, but that
doesn’t mean I trust yours. For me to cash your check, our banks must enter into
their own trust relationship. With many thousands of financial institutions
processing billions of transactions across hundreds of jurisdictions, this pairwise
structure quickly bogs down. Or more accurately, it works only with huge
inefficiencies and transaction costs.
Much of the time, transaction costs become further value-extraction
opportunities for the trusted actors. Hence the massive revenues for providers of
remittances and credit cards.162 The complexity of reconciling transactions
160 Timothy B. Lee, Bitcoin Needs to Scale by a Factor of 1000 to Compete with Visa.
Here’s How to Do it, WASH. POST THE SWITCH BLOG (Nov. 12, 2013),
https://www.washingtonpost.com/news/the-switch/wp/2013/11/12/bitcoin-needs-to-
scale-by-a-factor-of-1000-to-compete-with-visa-heres-how-to-do-it/. New technologies
may greatly increase the speed of the Bitcoin transaction network. See Romain Dillet,
Blockchain Open Sources Thunder Network, Paving the Way for Instant Bitcoin Transactions,
TECHCRUNCH (May 16, 2016), https://techcrunch.com/2016/05/16/blockchain-open-
sources-thunder-network-paving-the-way-for-instant-bitcoin-transactions/.
161See Nick Szabo, The Dawn of Trustworthy Computing, UNENUMERATED (Dec. 11,
2014), http://unenumerated.blogspot.com/2014/12/the-dawn-of-trustworthy-
computing.html.
162The remittance market generates $38 billion in annual fees worldwide. See
Tapscott & Tapscott, supra note 98, at 183
Trustless Trust 35
between many interconnected trusted parties adds delay to the process. Stock
trades, for example, typically settle after three days (a standard known as T+3).163
In essence, the traditional trust model of the financial system and the
blockchain model both create decentralized ledgers. In the traditional system,
every node is individually responsible for keeping its ledger in sync with the
virtual consensus, but it only has visibility (limited at that) into its direct
partners. With the blockchain, every block added reconciles its transactions
across the entire system. It effectively parallelizes what is otherwise a collection
of serial processes. Each individual transaction takes much longer to be
recorded, but the global state of the system is updated more rapidly. And
because this occurs through one synchronized process, rather than a potentially
large number of separate transactions, costs may be significantly lower.164
Goldman Sachs estimates that the blockchain could save $11-$12 billion
annually in settlement and reconciliation costs for securities transactions.165
Bitcoin and other blockchain-based systems do face significant scaling
challenges. The Bitcoin development community is engaged in debates about
mechanisms such as increasing the size of each block to improve performance.166
By contrast, the existing financial system has been optimized over an extended
period for robust operation at massive scale. Predictions that the blockchain will
soon sweep away the banking system as we know it are thus exaggerated.
However, the potential for faster and more efficient reconciliation is a key
reason major established financial institutions are actively exploring
permissioned blockchains.
163 See John McCrank, Settlement Time for U.S. Trades Closer to Being Shortened,
REUTERS (Apr. 23, 2014, 9:03am EDT), http://www.reuters.com/article/us-markets-
clearing-dtcc-idUSBREA3M10920140423.
164 See Building the Trust Engine, supra note 98, at 9, 18.
165 See Schneider et al, supra note 14, at 5.
166 See Narayanan et al, supra note 98, at 98.
167 See Jason Leibowitz, Blockchain’s Big Innovation is Trust, Not Money, COINDESK
(May 21, 2016), http://www.coindesk.com/blockchain-innovation-trust-money/ (“Trust
is the key element of blockchain technology.”); Frisby, supra note 108; Kevin Maney,
Trust and Verify: The Coming Blockchain Revolution, NEWSWEEK (May 23, 2016),
http://www.newsweek.com/2016/06/03/blockchain-technology-will-remake-global-
Trustless Trust 36
cumbersome apparatus of mining and consensus exists so that users will have
confidence the transactions recorded on a distributed ledger are accurate. The
domains where the blockchain operates, staring with finance, are those in which
a heightened level of trust is important for transactions to occur. Anyone who
exchanges traditional currency for Bitcoin, or accepts as valid an entry on a
blockchain registry, is manifesting trust. And that trust is what, at least in
theory, makes the blockchain an alternative to legal enforcement.
One dimension of blockchain trust is the virtual nature of the interactions.
You can’t see a Bitcoin; it’s just an entry on a distributed ledger.169 Yet that is
hardly unique in today’s world.170 We accept that our bank accounts represent
actual money and our stock purchases represent real equity even though we view
them electronically. Intellectual property rights such as copyright, trademarks,
and patents are valuable sources of competitive advantage, and alienable assets
in themselves. Furthermore, this is a standard issue with all online
interactions.171
A second dimension of trust is the belief that each unit of the currency in
fact represents a unique asset, which may fluctuate in value but will remain
useful as a medium of exchange. Bitcoin users must be sufficiently comfortable
that the currency overcomes the technical threats such as double-spend and
Sybil attacks.172 If like most ordinary consumers they rely on a digital wallet
service or other intermediaries to hold their Bitcoin, they must be confident
their accounts are secure, much like a traditional bank. And they must have
confidence the entire Bitcoin infrastructure won’t collapse due to cyber-attacks,
flaws in the protocol, miners no longer validating blocks, or some other failure.
When Bitcoin first entered the wild in 2009, few were enterprising enough to
rely on it as money. Over time, confidence has grown. For a period in spring
2016, Bitcoin was more stable in price than gold,173 and following the United
Kingdom’s vote to exit the European Union, it was more stable than the British
Pound.174
Yet there is an odd aspect here. Trust is a transitive verb. Who or what are
Bitcoin users trusting? Not only are banks removed from the process, but so are
governments. When I buy a grande latte macchiato at Starbucks and give the
cashier a five-dollar bill, we’re both trusting that the bill is worth more than the
negligible value of the paper. The value of the bill ultimately derives from the
“full faith and credit” of the United States of America. Bitcoin removes even that
backstop. It substitutes an ecology of miners and other nodes hosting
synchronized copies of the blockchain, but critically, I need trust none of them.
Bitcoin is a solution to the Byzantine Generals Problem in cryptography, which
postulates that any node may be untrustworthy.175
To accept a blockchain transaction as valid is to trust the system it’s based
on, without trusting any participant in it.176 The very first line of Nakamoto’s
paper makes this point: “Commerce on the Internet has come to rely almost
exclusively on financial institutions serving as trusted third parties to process
electronic payments.”177 Bitcoin was a way to remove those trusted third parties
from the equation, without losing the confidence they provided.
Venture capitalist and LinkedIn founder Reid Hoffman labeled this
arrangement, “trustless trust.”178 The phrase has caught on.179 Though it sounds
like an oxymoron, both sides are essential. If Bitcoin and the blockchain did not
inspire trust, they would fail. Yet if they achieved trust by proxy through
governments or large intermediaries, they wouldn’t significantly differ from the
status quo. Trustless trust is more than just a new way to handle transactions; it
is a trust architecture that differs in important ways from the established
alternatives.
Broadly speaking, the Leviathan approach, with its reliance on coercive state
power, is most appealing where the financial or other tangible risks are large
relative to the interpersonal ones. Conversely, peer-to-peer trust is appealing in
contexts where social norms are important. This division does not entirely map
to corporate vs. individual or community interactions. For example, open source
software communities may involve large companies and significant financial
activity, yet remain largely governed through peer-to-peer trust.180 And in some
countries, business transactions are heavily bound up with interpersonal
commitments, with fear of loss of face as a significant impetus to performance.
In others, a deal is just a deal, and a breach of contract is just a calculation about
expected values. As a general matter, though, Leviathan trust can feel like
overkill where personal relationships are prominent. Peer-to-peer trust may lack
sufficient enforcement certainty where they are not.
Trustless trust sits somewhere in the middle. It offers confidence through an
inherently impersonal mechanism: the blockchain. Cryptographic enforcement
through decentralized proof of work is even more distant from human
relationships than legal enforcement through the courts. However trustless trust
is radically decentralized. Any individual or small organization can avail
themselves of the benefits of the shared ledger or create smart contracts. There
is no sharp division between using the blockchain to record financial derivatives
and using it to store recipes. Blockchain applications range from micro-
transactions among Internet of Things devices to massive financial transactions
between banks. And because it has no necessary geographic or national
foundations, the blockchain can apply across boundaries in ways that law may
struggle to.
With trustless trust, miners are trustworthy for the benefit of the block
reward, the costs of proof of work, and their inability to undermine legitimate
consensus unless they have a majority of the mining power. Private blockchain
179 See Jalak Jobanputra, How the Blockchain Can Unshackle the World, COINDESK (April
Distributed
complete and accurate copy of the blockchain; there are no administrative nodes
or hierarchical relationships.186 Everyone has access to the same software. So
long as they do not control a large percentage of the mining power, no
untrustworthy actors can undermine the integrity of the system. That is the
“trustless” dimension of the blockchain.
This diffuse form of trust is not entirely orthogonal to traditional
conceptions. In Fukuyama’s analysis, trust is an expectation which arises within
communities of shared norms.187 Trust is not merely a disposition between
distinct parties; it is a collective state of a system. The basis of Fukuyama’s
argument, as well as Putnam’s research on social capital, is that societies vary
(between themselves and over time) on the strength of trust relationships they
support.188 High-trust societies develop powerful private firms and government
institutions because of their strong bedrock of interpersonal trust, not the other
way around. Centralized trust in specific transactions depends on a more
distributed baseline trust as an expression of social norms. In the same way, a
centralized relationship such as a digital wallet provider holding a customer’s
Bitcoin can be built on top of the distributed computational activity of the
blockchain.
As noted earlier, though the blockchain is physically distributed, it functions
as a logically centralized record.189 Nakamoto consensus means that there is one
unique and valid version of each transaction, even though that transaction is
recorded in many copies of the ledger. With traditional trust architectures,
because multiple entities maintain their own copies of the ledger, the system is
optimized not for uniqueness but for reconciliation.
considerably farther in the direction of fully distributed systems than the traditional
networks they replace.
186
In practice, Bitcoin isn’t quite perfectly decentralized. Miners generally adopt
code updates issued by the Bitcoin’s core developers, and the Bitcoin Foundation works
to promote standardization. See Jon Matonis, Bitcoin Foundation Launches to Drive
Bitcoin's Advancement, FORBES (Sept. 27, 2012, 6:55am),
http://www.forbes.com/sites/jonmatonis/2012/09/27/bitcoin-foundation-launches-to-
drive-bitcoins-advancement/#37536b416bc9. The Bitcoin blockchain also incorporates
“checkpoints” that are added manually, not through the decentralized mining process.
187 See Fukuyama, supra note 20.
188 See id.
189 See Wenger, supra note 110.
Trustless Trust 41
Immutable
outcome.
195 See Narayanan et al, supra note 98, at 32.
196 See id. at 71-72.
Trustless Trust 42
altered. Even a subsequent transaction for the same account does not eliminate
the record of the old one.197
Blockchain trust is immutable in a probabilistic sense.198 Distinguishing
untrustworthy chains from the consensus is not an all-or-nothing decision. The
more subsequent blocks added following the one in question, the higher the
likelihood the transaction is accurate.199 Over time, therefore, trust in prior
transactions increases. Blockchain trust is thus not instantaneous.200 A new
block is verified on the Bitcoin blockchain every ten minutes. There may also be
delays adding a transaction to a block. Each block has a fixed size, so some
transactions must wait until the next block.201 Trust on the blockchain arises
after the fact; perhaps long after the fact.
The requisite confidence level (and thus delay) to accept a block as valid
depends on the risk profile of the activity. Someone with little at stake will
prioritize speed over small incremental robustness, while one engaged in a large,
important transaction will be willing to wait. In theory, the benefit of
probabilistic trust is that anyone can decide the level of assurance they want, by
tolerating additional delay. In practice, it’s not so simple.202 Users and even
businesses may not be able to judge how much confidence they need relative to
how much delay.
197Sending Bitcoin to someone does not actually mean removing assets from an
account. It involves destroying some existing coins, creating new ones, and then adding
a new transaction, not altering the prior records. See Narayanan et al, supra note 98, at
75-76.
198 See Vitalik Buterin, On Settlement Finality, ETHEREUM BLOG (May 9, 2016),
https://blog.ethereum.org/2016/05/09/on-settlement-finality/. Probabilistic trust is not
limited to blockchain. Google is rolling out a trust score for Android based on multiple
factors, to replace passwords. See Ashley Carman, Google Could Replace Some Passwords
with a ‘Trust Score’ by the End of the Year, VERGE (May 23, 201, 4:41pm),
http://www.theverge.com/2016/5/23/11749938/google-android-password-trust-score-
api-io.
199 See Buterin, supra note 198.
200See Abramowicz, supra note 102, at 375 (“[T]he possibility that someone might
make two such transfers simultaneously means that instant confirmation is
impossible.”).
201 See supra TAN 160.
202 A transaction six blocks deep is generally considered immutable, although this is
just an arbitrary convention. See Antonopoulos, supra note 125, at 211; Bonneau et al,
supra note 119 (noting that the six-block convention “originates from the reference
client and is not based on any analysis of the probability of deep forks.”).
Trustless Trust 43
Algorithmic
Google or Facebook; they are available for inspection by all participants in the
ecosystem.
Algorithmic trust can incorporate human decision-makers. One example
built into Bitcoin is multisig, short for multiple signatures.207 In a basic Bitcoin
transaction, the recipient of the currency must provide his or her private key to
receive the funds. Multisig allows the sender to specify that some fraction of a
larger number of keys are required. The most common multisig arrangement is
to require confirmation by two keys out of three. This allows for a simple
arbitration process. If both parties agree, their keys are sufficient to consummate
the transaction. If they disagree, the holder of the third key breaks the tie. That
third key-holder would typically be a neutral party selected in advance for such a
situation. Multisig thus allows the blockchain to connect with human-based
trust, because an arbitrator can break the tie between adversarial parties.
But is it Trust?
See HAROLD F. TIPTON AND MICKY KRAUSE, INFORMATION SECURITY MANAGEMENT HANDBOOK,
5th Ed. 1533 (CRC Press 2003).
207 See Antonopoulos, supra note 125, at 129.
208 See Mayer et al, supra note 38.
209 Fernando Flores and Robert C. Solomon, Creating Trust, 8 BUS. ETHICS Q. 205
(1998).
210 RUSSELL HARDIN, TRUST AND TRUSTWORTHINESS (2004).
Trustless Trust 45
account, not just your own. When you don’t take advantage me, and reward my
trust, our relationship is strengthened.
There is nothing quite like that in the blockchain’s concept of trustless trust.
A purchaser of a diamond which has its provenance inscribed on the blockchain
is no longer trusting in the seller’s goodwill. Nor are they trusting in the
goodwill of the verification service provider and the miner validating the blocks
recording the transactions. The records of sale are immutable. One assumes
miners are but ruthless profit-maximizers, some of them unscrupulous. Yet one
still trusts the accuracy of the records stored on the distributed ledger.
Philosophers of trust generally argue that machines cannot be trusted.211 The
argument is not that machines are unreliable. To the contrary, they may be
considerably more reliable than the humans they replace. Machines do not have
a will. And trust is a manifestation of the goodwill of the one being trusted.212
Perhaps the idea of, to use The Economist’s term, a “trust machine,”213 is a bit of
an oxymoron.
Satoshi Nakamoto recognized that the blockchain is in some ways an
alternative to trust, rather than a creator of it. In a discussion group post before
he disappeared, Nakamoto stated that Bitcoin is “completely decentralized, with
no central server or trusted parties, because everything is based on crypto proof
instead of trust [emphasis added].”214 He went on state that, “The root problem
with conventional currency is all the trust that's required to make it work.”215 In
some ways, therefore, the blockchain is not a new form of trust, but an
alternative to it. If Judge Posner is right that trust is a substitute for
information,216 perhaps the blockchain is a substitute for that substitute.
Or perhaps there is something deeper going on. The blockchain does remove
the need for confidence in any identifiable actor. Yet it is still trustful. Those
who rely on distributed ledgers are not just making a rational calculation; a
degree of faith is required. In these early days for the blockchain, that faith
derives from the lack of longitudinal evidence that any distributed ledger does,
in fact, work as intended in the real world. Even once there is a track record,
there are too many points of instability to model risk with certainty. Transaction
capacity may fail to scale sufficiently, rewards may be insufficient to attract
miners, mining may become too consolidated, and previously unknown attack
vectors may be developed, to name just a few possibilities. Such risks are true
vulnerabilities: there is no recourse mechanism built into the blockchain.217
The blockchain is a foundation for trusted relationships because standing
behind it, more than it seems, are people.218 As Circle co-founder Sean Neville
noted, “Cryptography and software could replace the gatekeepers, but that
doesn’t mean we don’t have trust in human beings at all.”219 The blockchain is in
some sense “just” a global distributed computer. In other ways, it is a collective
entity—like firms and communal organizations—that can engender both
cognitive and affective trust.
While it may not be meaningful to talk of benevolence in connection with
the blockchain, the other two elements of trustworthiness—ability and
integrity—are operative.220 One can have confidence that the blockchain can
deliver on its commitments. And can believe believes in the values instantiated
in its software. A distributed ledger, whether Bitcoin, Ethereum, or some other
platform, reflects an evolving set of design choices. Nakamoto Consensus, for
example, relies on assumptions about incentive structures for miners. And
Bitcoin adopts a pseudonymous identity approach, rather than strict anonymity
or real names. Such decisions are themselves made on some principled, non-
arbitrary basis.
The trustworthiness of the blockchain is not guaranteed. But that is the
point. So long as there is rational option not to trust, the affirmative choice is
meaningful.
217
See supra notes 62-65 and accompanying text.
218 See infra Part (V)(B)(1).
219 Pete Rizzo, Circle Execs: The DAO Proves Blockchains Require Trust, COINDESK (June
22, 2016, 3:09 BST), http://www.coindesk.com/circle-execs-dao-proves-blockchains-
trust/.
220
See supra Part (III)(B)(3).
Trustless Trust 47
A. Blockchain Applications
There are three major areas in which the blockchain has begun to take root:
finance, proof-as-a-service, and decentralized applications.
Finance
221 See Wright & De Filippi, supra note 102, at 16 (“By facilitating coordination and
trust, a blockchain enables new forms of collective action that have the potential to
bypass existing governance failures.”).
222See Davey Alba, This Digital Wallet Could Finally Get You Into Bitcoin, WIRED, (Apr.
30, 2015 12:44pm), http://www.wired.com/2015/04/circle-bitcoin-digital-wallet/.
223 See David Meyer, More Banks Are Trying Out Blockchains for Fund Transfers,
FORTUNE (June 23, 2016, 4:10am EDT), http://fortune.com/2016/06/23/ripple-blockchain-
banks/.
Trustless Trust 48
Proof-as-a-Service
229See Stan Higgins, Bitcoin Startup Abra Moves to Launch Mobile Remittance App,
COINDESK (Oct. 22, 2015, 16:00 BST), http://www.coindesk.com/bitcoin-startup-abra-
moves-to-launch-mobile-remittance-app/.
230 See WILLIAM MOUGAYAR, THE BUSINESS BLOCKCHAIN 35-36 (2016).
231 http://www.originstamp.org
232 https://www.proofofexistence.com.
233
See Tapscott & Tapscott, supra note 98.
234 See Nicole Kobie, Blockchain Could Track Your Fish Supper from Boat to Plate,
WIRED (Nov. 24, 2015), http://www.wired.co.uk/article/jessi-baker-wired-retail-2015.
Trustless Trust 50
Several startups are focused on this opportunity either for particular goods or
generally.235
More broadly, proof-as-a-service can validate any resource. This potentially
makes the blockchain into the authoritative registry for anything.236 IBM and
Samsung envision the blockchain powering the Internet of Things, the coming
world of trillions of networked sensors on virtually every device.237 Even
governments are recognizing they may be better off maintaining registries in a
distributed ledger than in a centralized database. The state of Delaware
announced in May 2016 that it was partnering with startup Symbiont to migrate
the state’s internal recordkeeping for Delaware-domiciled companies to the
blockchain.238
Land titles are an example of how blockchain-based registries might do more
than just improve efficiency. Countries such as the United States have well-
developed systems for registration of land titles, going back to the 19th century
or earlier. Recording of deeds means that land owners can use, sell, or subdivide
their property with confidence, or can use it as collateral on loans. The Peruvian
economist Hernando de Soto argues that the absence of well-functioning land
registration systems in the developing world is a major impediment to economic
235 These include Fluent, see Stan Higgins, Supply Chain Startup Fluent Raises $1.65
Million in Seed Funding, COINDESK (May 10, 2016, 13:44 BST),
http://www.coindesk.com/supply-chain-startup-raises-1-65m-seed-funding/ (supply
chain verification); Verisart, see Mike Butcher, Verisart Plans to Use the Blockchain to
Verify the Authenticity of Artworks, TECHCRUNCH (July 7, 2015),
http://techcrunch.com/2015/07/07/verisart-plans-to-use-the-blockchain-to-verify-the-
authencity-of-artworks/ (artwork); Everledger, see supra note 8 (diamonds); and Ascribe,
see supra note 9 (attribution for content creators).
236 See Fairfield, supra note 103, at 809 (“Trustless ledgers offer the potential to
significantly address one of the great inefficiencies of modern property: its reliance on
expensive, inaccurate, hard-to-access, hard-to-search, and insecure ledgers of all
stripes.”); Abramowicz, supra note 102, at 372 (“Thus, in principle, a block chain can be
an authoritative, chronologically ordered record of any type of legal decision.”).
237 Paul Brody & Veena Pureswaran, DEVICE DEMOCRACY : SAVING THE FUTURE OF THE
INTERNET OF THINGS (2015). Colin Barker, Is Blockchain the Key to the Internet of Things?
IBM and Samsung Think it Might Just Be, ZDNET (Jan. 21, 2015),
http://www.zdnet.com/article/is-blockchain-the-key-to-the-internet-of-things-ibm-
and-samsung-think-it-might-just-be/#!.
238Stephen Joyce & Gregory Roberts, Delaware Introduces Blockchain Initiative,
BLOOMBERG BNA (May 4, 2016), http://www.bna.com/delaware-introduces-blockchain-
n57982070625/.
Trustless Trust 51
development.239 Initiatives are underway in various parts of the world to use the
blockchain as a solution.240
Finally, proof-as-a-service can be the foundation for smart property.241 This
is the concept that physical assets could maintain a record of their own access
and use rights, which could be updated dynamically. A car-sharing service such
as Zipcar, for example, could automatically transfer access rights, as well as
insurance, repossession rules, and other aspects upon presentation of a digital
signature. Property rights in digital assets such as intellectual property are
nothing new, but the blockchain might change the ways such rights can be
practically established and used.242
Decentralized Applications
The last set of blockchain uses is the most far-reaching. Systems in the
category Mougayar labels proof-in-a-service are more generally known as
decentralized applications, or DApps.243 If smart contracts turn the blockchain
into a distributed computer, DApps are the interactive services that run on that
computer. Because Bitcoin originally focused on currency transactions and
offered limited smart contract capabilities, it took time for the DApp market to
develop. Ethereum’s ability to function as an application server and
development environment for decentralized applications has catalyzed activity
since the latter part of 2015.244
As with the financial uses of the blockchain, many decentralized applications
mimic existing centralized applications. Stroj provides decentralized cloud
245Storj, the New Decentralized Cloud Storage Platform Goes Live, NEWSBTC (Apr. 10,
2016, 4:30pm), http://www.newsbtc.com/2016/04/10/storj-new-decentralized-cloud-
storage-platform-goes-live/
246 http://decent.ch/.
247 See supra note 11.
248 See supra note 12.
249 See Schneider et al, supra note 14, at 4.
250
A trial program of this sort is underway in Brooklyn, New York. See Aviva Rutkin,
Blockchain-Based Microgrid Gives Power to Consumers in New Nork, NEW SCIENTIST (March
9, 2016), https://www.newscientist.com/article/2079845-blockchain-based-microgrid-
gives-power-to-consumers-in-new-york/.
251
See Schneider et al, supra note 14.
252See Vitalik Buterin, Bootstrapping A Decentralized Autonomous Corporation: Part I,
BITCOIN MAG. (Sept. 19, 2013), https://bitcoinmagazine.com/7050/bootstrapping-a-
decentralized-autonomous-corporation-part-i/; MELANIE SWAN, BLOCKCHAIN: BLUEPRINT
FOR A NEW ECONOMY (2015). Wright & De Filippi, supra note 102, at 17, 31-32.
Trustless Trust 53
The idea sounds like science fiction, but it is very real. A small group of
German programmers created a crowdfunding platform called “The DAO” based
on Ethereum and launched it in May 2016.253 The DAO is designed to provide
Ether (the Ethereum cryptocurrency) to projects selected by a vote of its
contributors. In just a few weeks, the equivalent of over $150 million in Ether
was pledged to the DAO to use for crowdfunding.254 The legal status of this
virtual corporation as well as that of its investors, developers, and beneficiaries,
is an open question.255
The explosion of decentralized applications, like the explosion of Web
applications in the late 1990s, is producing a wealth of experimentation and
innovation. Some of the most ambitious early Web startups, such as Webvan
and Kozmo.com, failed spectacularly as well. So long as the basic rationales for
distributed systems are valid, firms that solve real problems in a technically and
economically feasible way will eventually succeed.
Blockchain as Supplement
257
See Wright & De Filippi, supra note 102.
258 See supra Part III(B)(2).
259 Cf. Building the Trust Engine, supra note 98, at 8 (“Instead of making them
superfluous, the blockchain may very well make banks better at what they do.”).
260 See Schneider et al, supra note 14, at 4-5.
261 See supra Part IV(C)(2).
Trustless Trust 55
Blockchain as Complement
268See Jerry Brito & Bridget Dooling, An Orphan Works Affirmative Defense to
Copyright Infringement Actions, 12 MICH. TELECOMM. & TECH. L. REV. 75 (2005).
269
See Patrick Murck, Waste Content: Rebalancing Copyright Law to Enable Markets of
Abundance, 16 ALB. L.J. SCI. & TECH. 383, 416-17 (2006).
270
Similarly, the blockchain could be used to create unique digital assets that allow
for a digital version of copyright’s longstanding first sale doctrine. See Patrick Murck,
The True Value of Bitcoin, CATO UNBOUND, July 31, 2013, http://www.cato-
unbound.org/2013/07/31/patrick-murck/true-value-bitcoin.
Trustless Trust 57
back to artists, including Ujo Music, PeerTracks, and the Open Music
Initiative.271
These ventures still face the challenge of entrenched power dynamics. Even
if artists have the technical capacity to control their output, they may not have
the practical ability to do without the marketing and distribution power of the
music industry. In all likelihood, a limited segment of artists will be sufficiently
big but sufficiently small to take advantage of distributed rights platforms, but
this would still be an advance over the current artist-hostile system.
As with the supplemental applications, these blockchain-based solutions
leave conventional law (in this case, the copyright system) in place. However,
they extend it to new applications that are untenable through existing trust
architectures. As a result, there may need to be mappings between the apparatus
of legal enforcement and the technical framework of distributed ledgers.
The blockchain can also provide alternative solutions for trusted exchanges
when legal authorities refuse to give their sanction. When the government of
Buenos Aires in Argentina blocked credit card companies from accepting Uber
ride-sharing transactions, the company switched to a debit card transacting in
Bitcoin.272 This example resembles Silk Road and other uses of Bitcoin for illegal
activity.273 The difference is that the underlying activity is not per se illegal,
merely subject to a regulatory dispute. The cryptocurrency gives Uber leverage
against the Buenos Aires government, by establishing a trusted payment option
271 See Gideon Gottfried, How “the Blockchain” Could Actually Change the Music
Industry, BILLBOARD (Aug. 5, 2015),
http://www.billboard.com/articles/business/6655915/how-the-blockchain-could-
actually-change-the-music-industry; Ian Allison, Imogen Heap Shows How Smart Music
Contracts Work Using Ethereum, INT’L BUS. TIMES (Oct. 4, 2015, 7:51 BST),
http://www.ibtimes.co.uk/imogen-heap-shows-how-music-smart-contracts-work-using-
ethereum-1522331; Malcolm Gay, Can Major Initiative Led by Berklee Solve Music-Rights
Problems?, BOSTON GLOBE, June 13, 2016,
https://www.bostonglobe.com/arts/music/2016/06/12/berklee-lead-musical-rights-
initiative/aXBXC8adJgXE4IRRt8dcKO/story.html.
272
See Joel Valenzuela, Uber Switches to Bitcoin in Argentina After Govt Blocks Uber
Credit Cards, COINTELEGRAPH (July 6, 2016, 11:40am),
http://cointelegraph.com/news/uber-switches-to-bitcoin-in-argentina-after-govt-
blocks-uber-credit-cards.
273
See supra note 153.
Trustless Trust 58
Blockchain as Substitute
274
The Buenos Aires government couldn’t block the Uber riders from using the
distributed Bitcoin network. However, it could probably issue an order against the Swiss
firm, Xapo, that provides the debit cards which translate between Bitcoin and the local
currency. See Valenzuela, supra note 272.
275 See supra Part IV(A)(1).
276
See supra TAN 252-254.
277
See David R. Johnson & David G. Post, Law and Borders: The Rise of Law in
Cyberspace, 48 STAN. L. REV. 1367 (1996).
278Wright & De Filippi, supra note 102, at 44-47. See generally Joel Reidenberg, Lex
Informatica: The Formulation of Information Policy Rules through Technology, 76 TEXAS L.
REV. 553 (1997) (developing the concept of Lex Informatica by analogy to the historical
Lex Mercatoria).
279 Wright & De Filippi, supra note 102, at 40.
280 See generally Kevin Werbach, The Song Remains the Same: What Cyberlaw Might
Teach the Next Internet Economy, __ FLA. L. REV. __ (forthcoming 2017) (detailing how the
vision of unregulated digital spaces failed); JACK GOLDSMITH & TIM WU, WHO CONTROLS
THE INTERNET? ILLUSIONS OF A BORDERLESS WORLD (2006) (showing how governments
successfully imposed controls on online activity).
Wright & De Filippi acknowledge this fact. See Wright & De Filippi, supra note 102,
at 49. They suggest the blockchain might dramatically expand the scope of regulation by
code relative to other regulatory modalities. See id. at 50. While this could be the case,
Trustless Trust 59
they had a strong desire to regulate online activity, they found ways to do so. A
similar pattern seems likely for activity on the blockchain: Where the stakes are
high enough, governments will not simply defer their authority. Even when
transactions are entirely digital, peer-to-peer, cross-border, and
cryptographically secured, providers on the network can be identified and
subject to territorial legal obligations.281 Moreover, outside of activity that is
illegal or in need of extreme security, the incentives are lacking for most users to
adopt custom legal systems where the existing ones are functional.282 And as the
creators of The DAO discovered, taking the place of law is not as easy as it may
seem.283
On the other hand, where there is no viable rule of law in place, the
blockchain trust architecture may operate as a stand-in. In these scenarios a
traditional legal trust architecture is not an option. This is, in a sense, the
the fact that the distributed ledgers provide the capability to develop customized
extralegal rule-sets does not mean they will be. Given the experience of the past twenty
years, the burden is on those arguing the outcome will be different this time. It bears
noting that while distributed ledgers based on Nakamoto Consensus are new, smart
contracts and digital currencies are not. Nick Szabo described the mechanism for private
regulation by smart contract in the 1990s. See Szabo, supra note 145. There has not,
however, been widespread adoption of cryptographically-based private law.
281See Goldsmith & Wu, supra note 280. For further validation, just ask the creators
of Grokster, Kazaa, and Streamcast, the decentralized file-sharing services that were
shut down when the U.S. Supreme Court declared them liable for contributory copyright
infringement. See MGM Studios, Inc. v. Grokster, Ltd., 545 U.S. 913 (2005). The courts
cannot entirely prevent distribution or use of open-source peer-to-peer software, but
they can impose liability on companies making money from that software. There is an
important difference between fringe activities of bands of users, and substantial markets
that can scale for the mainstream.
282 There are similar problems with Josh Fairfield’s appealing argument that smart
contracts could be used to create intelligent agents that autonomously negotiate terms
of service with online sites, thus shifting the balance of power back to users. See Josh
Fairfield, Smart Contracts, Bitcoin Bots, and Consumer Protection, 71 WASH. & LEE L. REV.
ONLINE 36 (2014), http://scholarlycommons.law.wlu.edu/wlulr-online/vol71/iss2/3. Why
would service providers budge? They still hold all the cards, even if users have the
technical ability now to request different terms. The dynamics would only change if
courts reversed twenty years of precedent and declared clickwraps invalid without
evidence of active consideration by the user or her software agent, which seems unlikely.
And while some sophisticated users may employ the new technology of the blockchain to
wrest control from intermediaries, most users will choose convenience and familiarity
instead, as they always do.
283
See infra Part (IV)(C)(4).
Trustless Trust 60
284
See Tapscott & Tapscott, supra note 98, at 188-92.
285 See supra TAN 50.
286
Agreement does not necessarily presume trust. An insight of game theory is that
even non-communicating parties may converge on common points by independently
choosing the most likely or familiar option. See THOMAS C. SCHELLING, THE STRATEGY OF
CONFLICT (Harvard University Press 1960). The creators of both smart contracts and
Ethereum make reference to these Schelling Points. See Szabo, supra note 145; Vitalik
Buterin, SchellingCoin: A Minimal-Trust Universal Data Feed, ETHEREUM BLOG (March 28,
2014), https://blog.ethereum.org/2014/03/28/schellingcoin-a-minimal-trust-universal-
data-feed/.
287 Ko Kuwabara, Do Reputation Systems Undermine Trust? Divergent Effects of
Enforcement Type on Generalized Trust and Trustworthiness, 120 AM. J. SOCIOLOGY 1390,
1397 (2015).
Trustless Trust 61
misconduct or breach. That doesn’t make them trust the counterparty any more.
In fact, mandatory mechanisms that guarantee enforcement may actually reduce
trust, rather than enhancing it.288
Philosophers of trust emphasize this dimension. Karen Jones says that trust
is not an expectation of performance, but an expectation about the goodwill of
the one considered trustworthy.289 Trust, she argues, means “that the one
trusted will be directly and favorably moved by the thought that someone is
counting on her.”290 A blockchain cannot be “favorably moved.”291 The danger
here is that reliability doesn’t necessarily produce the full benefits of trust.
Confidence is performance isn’t the same thing as a true relationship. It doesn’t
necessarily produce spillovers into other activities, the kind of thick social
capital that Fukuyama and Putnam emphasized.
Systemic Risks
Blockchain-based systems are not invulnerable. There are several ways that
trust in distributed ledgers may prove unjustified. The nature and magnitude of
these risks vary, so they should be considered separately. Moreover, different
levels of security and robustness are needed depending on the application. A
bank will be more concerned about certain risks than a merchant engaged in a
small-value consumer transaction. Medical records on the blockchain will have
different risk profiles than supply chain records for diamonds. Such variation is
not unique to the blockchain; it is part of trust and security with existing
centralized systems. Given the novelty of distributed ledgers, though, it will take
some time to sort out the appropriate security models.
At the most general level, distributed ledgers depend on modern
cryptographic techniques, including secure hashing algorithms and elliptic curve
cryptography. Basic vulnerabilities in these mechanisms cannot be ruled out,
especially with advances in computing power. If such flaws exist, however, they
will apply at least as strongly to the existing online transactional systems, which
rely on the same cryptography. A more likely danger is flawed implementation of
288See Ribstein, supra note 52, at 555 (“[M]andatory rules to increase trust, in any
form, may have precisely the opposite effect.”)
289 Jones, supra note 50, at 8.
290 Id.
291 Phillip Pettit made a similar argument about electronic commerce. One might rely
on eBay sellers to deliver the specified goods, he stated, but this is not the same thing as
trusting them. See Phillip Pettit, Trust, Reliance and the Internet, http://analyse-und-
kritik.net/2004-1/AK_Pettit_2004.pdf
Trustless Trust 62
292See Buterin, supra note 198 (listing three occasions when the Bitcoin blockchain
was forked due to bugs that allowed double-spending or other attacks).
293
While the 51% attack is the most widely-discussed scenario, security researchers
have identified several other potential attack vectors against Bitcoin. See Bonneau et al,
supra note 119, at 7-9.
294See Jon Matonis, The Bitcoin Mining Arms Race: GHash.io and the 51% Issue,
COINDESK (July 17, 2014, 16:20 BST), http://www.coindesk.com/bitcoin-mining-detente-
ghash-io-51-issue/.
295
More generally, public blockchains must maintain sufficient scale and network
effects to remain viable. See Fairfield, supra note 103, at 823-24.
296
See Fredrick Reese, As Bitcoin Halving Approaches, 51% Attack Question Resurfaces,
COINDESK (July 6, 2016, 12:50 BST), http://www.coindesk.com/ahead-bitcoin-halving-51-
attack-risks-reappear/ (describing concerns about a 51% attack after the halving in July
2016). Adjusting to the expected scarcity, the price of Bitcoin tends to increase around
these halving points, but equilibrium is not guaranteed. Other blockchains do not
necessarily use the halving mechanism, but all those employing proof of work face the
concern about incentives when the price of the cryptocurrency falls.
Trustless Trust 63
with support from the same major financial institutions that manage global
securities markets,301 can be expected to exercise similar levels of care to existing
financial systems. Some blockchain implementations likely will have basic
vulnerabilities, but there is reason for optimism about the most prominent ones.
301
See Edward Robinson and Matthew Leising, Blythe Masters Tells Banks the
Blockchain Changes Everything, BLOOMBERG MARKETS (Aug. 31, 2015),
http://www.bloomberg.com/news/features/2015-09-01/blythe-masters-tells-banks-the-
blockchain-changes-everything.
302 See supra TAN 218.
303 Sean Neville, co-founder of the Bitcoin payments platform Circle, distinguishes
trust in the data on a blockchain from trust in the governance of software connected to
it. See Sean Neville, Trust, Trolleys, Infrastructure: Indirect DAO Thoughts, MEDIUM (June
22, 2016), https://medium.com/@psneville/trust-trolleys-infrastructure-indirect-dao-
thoughts-746e35a8fbca#.i1rekwe48.
304 There is widespread agreement that such services should be subject to some
financial and consumer protection regulations, much as non-bank consumer online
payment services such as Paypal are today. Circle was the first company to be granted a
“BitLicense” under new New York state regulations for cryptocurrency transmitters. See
Paul Vigna, Circle Gets First ‘BitLicense,’ Releases Circle Pay, New Service, WALL ST. J.
MONEYBEAT (Sept. 22, 201, 12:00am ET),
http://blogs.wsj.com/moneybeat/2015/09/22/circle-gets-first-bitlicense-releases-
circlepay-new-service/.
305 See Amir Mizroch, Large Bitcoin Exchange Halts Trading After Hack, WALL ST.
306
See Antonopoulos, supra note 125, at 123.
307 See Zikai Alex Wen and Andrew Miller, Scanning Live Ethereum Contracts for the
“Unchecked-Send” Bug, HACKING, DISTRIBUTED (June 16, 2016, 1:15PM),
http://hackingdistributed.com/2016/06/16/scanning-live-ethereum-contracts-for-bugs/.
308See Sanford J. Grossman & Oliver D. Hart, The Costs and Benefits of Ownership: A
Theory of Vertical and Lateral Integration, 94 J. POLITICAL ECON. 691 (1986); Herbert
Simon, A Behavioral Model of Rational Choice, in MODELS OF MAN, SOCIAL AND RATIONAL:
MATHEMATICAL ESSAYS ON RATIONAL HUMAN BEHAVIOR IN A SOCIAL SETTING (Wiley 1957).
309 See Kevin Werbach and Nico Cornell, Dumb Contracts (forthcoming).
310See Vitalik Buterin, Thinking About Smart Contract Security, ETHEREUM BLOG, (June
19, 2016), https://blog.ethereum.org/2016/06/19/thinking-smart-contract-security/.
311See Stephen Palley, Smart Contracts, Performance, and Trust, MEDIUM (May 28,
2016), https://medium.com/@palleylaw/smart-contracts-performance-and-trust-
4470792728bb#.28hswnrqd.
Trustless Trust 66
record smart contracts; it executes them. By itself, the blockchain removes the
opportunity for the courts to offer redress to aggrieved parties.312
All these risks came together in the June 2016 attack on The DAO, the
Ethereum-based distributed crowdfunding system. Someone exploited a
vulnerability in The DAO’s code, which enabled them to siphon off currency to
their own account. Roughly one-third of all the Ether deposited with The DAO,
worth $70 million at the time, was subject to the attack.313 Because of the way
The DAO was set up, the attacker couldn’t spend or transfer that Ether for
approximately a month. In response to the attack, the developers of Ethereum
quickly created a software update to permanently quarantine the stolen Ether,
while the community considered next steps.314 However, that update itself
created security vulnerabilities, so it was rolled back.315
The DAO styles itself as a distributed system. In theory, no one is in charge;
not even the software developers who wrote the code.316 Therefore, unlike an
attack on a centralized site, there is no direct way to return the stolen currency.
After all, blockchain transactions are immutable.317 Any further action requires
significant collective action. That brings to the fore the practical problems of
312
See James Grimmelmann and Arvind Narayanan, The Blockchain Gang, SLATE (Feb.
16, 2016, 10:05am),
http://www.slate.com/articles/technology/future_tense/2016/02/bitcoin_s_blockchain_te
chnology_won_t_change_everything.html (“Block chains are the hardest property
technology ever made…. But they’re so hard they’re brittle.”).
313 Nathaniel Popper, A Hacking of More Than $50 Million Dashes Hopes in the World
of Virtual Currency, N.Y. TIMES DEALBOOK (June 17, 2016),
http://www.nytimes.com/2016/06/18/business/dealbook/hacker-may-have-removed-
more-than-50-million-from-experimental-cybercurrency-project.html?_r=2; Michael del
Castillo, The DAO Attacked: Code Issue Leads to $60 Million Ether Theft, COINDESK (June
17, 2016, 14:00 BST), http://www.coindesk.com/dao-attacked-code-issue-leads-60-
million-ether-theft/.
314Vitalik Buterin, CRITICAL UPDATE Re: DAO Vulnerability, ETHEREUM BLOG (June
17, 2016), https://blog.ethereum.org/2016/06/17/critical-update-re-dao-vulnerability/.
315See Michael del Castillo, New Vulnerability May Prevent Ethereum Soft Fork,
COINDESK (June 28, 2016), http://www.coindesk.com/ethereum-vulnerability-may-
prevent-soft-fork/.
316
This is separate from the pragmatic question of whether, if a lawsuit is filed, some
party or parties can be held legally accountable.
317 See supra Part (III)(D)(2).
Trustless Trust 67
sufficient adoption, and the governance questions about what changes the
community should adopt.
In the end, Ethereum opted for a “hard fork” to return the stolen Ether.318
The Ethereum Foundation, which maintains the open source code for the
platform, provided a software update to miners. For those running the new
software, the DAO hack never happened; their blockchains did not recognize the
currency transfers.
The move was not without controversy.319 It meant that Ethereum
transactions were not truly immutable, or immune from centralized
interference. It also raised concerns about what might happen when
governments or other central authorities became concerned about records stored
on distributed ledgers.320 While the Bitcoin blockchain has executed hard forks in
the past, those were technical fixes to double-spending bugs that undermined
the integrity of the distributed ledger.321 The Ethereum hard fork retroactively
invalidated otherwise technically legitimate transactions.
A hard fork creates two incompatible chains.322 Miners running the old
software show the DAO funds in the attacker’s account; miners running the new
software do not. In all other respects, however, the blockchains were identical at
the time of the fork. Other than the Ether in question, the two blockchains
showed the same users with the same accounts.
The assumption was that the pre-fork blockchain would wither away as
miners abandoned it and ceased to engage in proof of work. That did not
318
See Paul Vigna, Ethereum Gets Its Hard Fork, and the ‘Truth’ Gets Tested, WALL. ST.
J. MONEYBEAT BLOG (Jul 20, 2016 10:56 am ET),
http://blogs.wsj.com/moneybeat/2016/07/20/ethereum-gets-its-hard-fork-and-the-
truth-gets-tested/.
319
See Stan Higgins, Will Ethereum Hard Fork? DAO Attack Prompts Heated Debate,
COINDESK (June 17, 2016, 16:18 BST), http://www.coindesk.com/will-ethereum-hard-
fork/; Michael del Castillo Specter of Ethereum Hard Fork Worries Australian Banking
Group, COINDESK (June 29, 2016, 17:10 BST), http://www.coindesk.com/spectre-
ethereum-hardfork-worries-anz-banking-group/
320 Ethereum is a public blockchain, like Bitcoin. Permissioned blockchains do not
provide the same assurance of non-interference, because access is limited to identified
parties.
321 See Buterin, supra note 198.
322
Miners of one chain do not recognize the validity of blocks mined by the other
clients, and vice versa, even though they may otherwise use exactly the same protocols.
See Bonneau et al, supra note 119, at 10.
Trustless Trust 68
happen. A small but growing group of miners kept running the old software,323
evidently dissatisfied with the Ethereum Foundation’s willingness to break the
ledger’s immutability. A group of developers announced their intent to manage
the software going forward, under the name “Ethereum Classic” (ETC). And
some cryptocurrency exchanges began accepting ETC alongside the “new” post-
DAO Ether (ETH). This odd situation created new security and double-spending
risks. It also provoked reassessment of Ethereum’s potential as the dominant
blockchain-based application platform. One or the other of the Ethereum chains
might eventually die out, but even if that happens, the Ethereum hard fork offers
a cautionary note.
To a legal scholar, the whole incident is a classic example of rules vs.
standards.324 The DAO offered the promise of a deterministic system with no
messy case-by-case decision-making. Then along came a compelling reason to
fudge the rules. Whether or not the Ethereum Foundation made the right call,
the is that the controversy raised questions that could not be answered within
the framework of the blockchain. They required appeal to some higher-level
principles. The viability of trustless trust is ultimately a matter of governance.
Trustless trust will not succeed based on technology alone. As the DAO
debacle illustrates, Nakamoto Consensus is a necessary but not sufficient
foundation for blockchain-based systems in the real world. Governance
mechanisms are needed because even trustless trust depends on humans to a
surprising extent. Organizing those humans is at bottom a political process. And
law has a valuable role to play.
323
See Paul Vigna, The Great Digital-Currency Debate: ‘New’ Ethereum vs. Ethereum
‘Classic’, WALL ST. J. MONEYBEAT BLOG (Aug 1, 2016, 12:19 pm ET),
http://blogs.wsj.com/moneybeat/2016/08/01/the-great-digital-currency-debate-new-
ethereum-vs-ethereum-classic/.
324
See generally Louis Kaplow, Rules versus Standards: An Economic Analysis, 42 DUKE
L.J. 557 (1992).
Trustless Trust 69
colloquial definitions, this was a case of theft. From the perspective of the users
whose funds were taken, it was no different than someone exploiting a bug to
steal money stored with a centralized crowdfunding funding site such as
Kickstarter, or a bank. There are, however, two important differences with a
shared ledgers system such as The DAO. The first is that no administrator can
simply transfer the money back from one account to others, as they could with a
centralized service. The second is that one could argue no theft has occurred.
The attacker took advantage of functionality in The DAO’s code to create
valid smart contracts transferring the funds. Under The DAO’s terms of service,
functionality of the code expressly supersedes any human-readable terms:
[T]o the extent you believe there to be any conflict or discrepancy
between the descriptions offered here and the functionality of The DAO’s
code at 0xbb9bc244d798123fde783fcc1c72d3bb8c189413, The DAO’s
code controls and sets forth all terms of The DAO Creation.330
From a purely mechanical standpoint, there is no way to distinguish the
transfer of funds into a special “child DAO” account with depositor consent
(perhaps to crowdfund a project) from the same transfer initiated against their
will. There is similarly no way to determine whether the recursive call
functionality the attacker exploited was an intentional feature or a careless bug
in The DAO’s software, without asking the developers. This is not a situation
unique to The DAO. As Ethereum creator Vitalik Buterin put it, “the very
definition of smart contract theft or loss, is fundamentally about differences
between implementation and intent.”331 Intent is inherently a property of the
mind, not a written contract or its software expression. It is the sort of thing
courts attempt to tease out all the time. They marshal evidence but ultimately
rely on judges and juries to determine the expressed intent of the parties.
Without such human-based dispute resolution mechanisms, smart contracts
on the blockchain will sometimes execute in ways that are inconsistent with the
desire of the parties. Given the extraordinary scope of activity that could be tied
into distributed ledgers, this is potentially a very worrisome proposition. The
issue is not just financial loss as with The DAO. Blockchain registries will control
many physical assets and systems. Widespread failures of smart contracts to
achieve their intended results could not only undermine trust in the blockchain,
they could produce the kinds of damage anticipated (but largely unrealized) from
the Y2K bug in the year 2000.
332
Vlad Zamfir, Dear Ethereum Community, MEDIUM (July 7, 2016),
https://medium.com/@Vlad_Zamfir/dear-ethereum-community-
acfa99a037c4#.m7f6k44ap.
333
Id.
334
See, e.g., The Federalist No. 10, at 77 (James Madison) (Clinton Rossiter ed., 1961)
(describing factions as “mortal diseases under which popular governments have
everywhere perished….”).
335
Ethereum has not gone down this path. See infra note 342 and accompanying text.
336
See supra TAN 293.
Trustless Trust 72
337
See Andrew L. Russell, "Rough Consensus and Running Code" and the Internet-OSI
Standards War, IEEE ANNALS OF THE HISTORY OF COMPUTING 28(3), at 48, 48 (2006).
338
See Ostrom, supra note 24.
339
See Hurwitz, supra note 75, at 1580 (“The Internet’s early architecture was built
on a foundation of trust.”) Cf. A. Michael Froomkin, Habermas@discourse.net: Toward a
Critical Theory of Democracy, 116 HARV. L. REV. 749 (2003) (analyzing the internet
standards process as a rare example of a discourse achieving political legitimacy under
Jurgen Habermas’ theory of justice).
340
See Marjory S. Blumenthal & David D. Clark, Rethinking the Design of the Internet:
The End-to End Arguments vs. the Brave New World, 1 ACM TRANSACTIONS ON INTERNET
TECH.. 70, 93 (2001) (lamenting the loss of the simple trust model of the early internet).
341
See MILTON MUELLER, NETWORKS AND STATES: THE GLOBAL POLITICS OF INTERNET
GOVERNANCE (2010); LAURA DENARDIS, THE GLOBAL WAR FOR INTERNET GOVERNANCE (2014).
342
Zamfir, supra note 332. The developments organizations for Bitcoin have
generally not taken so extreme a view.
Trustless Trust 73
One way for the blockchain to achieve that higher-level trust is, perhaps
surprisingly, through the legal system. There are several mechanisms to
hybridize the blockchain’s distributed, algorithmic trust structures with the
human-interpreted, state-backed institutions of law. In some contexts, no legal
involvement will be needed. In others, where the blockchain is purely
supplemental, existing legal arrangements function normally without any
special integration. In many cases, however, affirmative steps must be taken to
combine the best aspects of distributed ledgers and centralized law.
The simplest way to make systems based on the blockchain operate more like
conventional legal arrangements is through voluntary approaches. Smart
contracts, for example, can be built from templates for contractual primitives
343
See Robin Hanson, Shall We Vote on Values, But Bet on Beliefs?, 21 J. POLITICAL
PHIL. 151 (2013) (describing futarchy); Vitalik Buterin, An Introduction to Futarchy,
ETHEREUM BLOG (Aug. 21, 2014), https://blog.ethereum.org/2014/08/21/introduction-
futarchy/ (explaining possible applications of futarchy to Ethereum).
344
See Jim Harper, Why Bitcoin Governance is a Competition (And That's a Good Thing),
COINDESK, February 12, 2016 16:17 BST, http://www.coindesk.com/bitcoin-governance-
as-competition/.
345
There is also the problem that technologists sometimes wish to divest themselves
of ethical responsibility for their creations. See Peck, supra note 204 (quoting Vlad
Zamfir) (“Generally, people don’t feel responsible. There’s a lot of feeling that we’re just
producing general-purpose tools and it’s not up to us what people do with them.”).
346
See Mueller, supra note 341; Hurwitz, supra note 75.
Trustless Trust 74
that have been designed with input from legal expert. A group called
CommonAccord and the British financial institution Barclays are developing
such smart contract modules.347 After the smart contracts are created, lawyers,
could have a role in reviewing terms. Legal code audits could be implemented
analogous to the security audits widely used by firms engaged in software
development. The skills required of lawyers would have to change, becoming
more like legal engineering.348
Substantively, most smart contract frameworks already incorporate the
ability to seek human input. Many smart contracts will need to interface with the
outside world. For example, a call option to buy a security at a certain price can
be executed algorithmically on the blockchain, with payment in Bitcoin or
another cryptocurrency. The blockchain, however, does not know stock prices.
That information must be provided to the smart contract through an external
connection, either to an automated data source or a human arbiter. Those
external sources are called oracles.349
As Wright and De Filippi point out, oracles could be extended to dispute
resolution by courts or private actors.350 More generally, smart contracts could by
default incorporate arbitration mechanisms or rollback provisions. Using
multisig, these provisions could be made difficulty to trigger if desired, serving
as a backstop in extraordinary cases such as the DAO attack. Or they could be
347See Bailey Reutzel, BNP Paribas Works with Blockchain Startup to Open Source Law,
COINDESK (May 5, 2016, 16:28 BST), http://www.coindesk.com/commonaccord-legal-
smart-contracts-prove-beneficial-one-bank-veritcal/; Ian Allison, Barclays’ Smart
Contract Templates Stars in First Ever Public Demo of R3's Corda Platform, INT’L. BUS. TIMES
(Apr. 18, 2016, 15:45 BST), http://www.ibtimes.co.uk/barclays-smart-contract-
templates-heralds-first-ever-public-demo-r3s-corda-platform-1555329.
348 Or perhaps creating a new niche for legal hackers. Following the DAO attack,
security expert Robert Graham suggested that, “in the past, people hired lawyers to
review complicated contracts. In the future, they'll need to hire hackers. After a contract
is signed, I'm now motivated to hire a very good hacker that will keep reading the code
until they can find some hack to my advantage.” Robert Graham, Ethereum/TheDAO
attack Simplified, ERRATA SECURITY (June 18, 2016),
http://blog.erratasec.com/2016/06/etheriumdao-hack-similfied.html#.V2wGDOYrKV5.
349 See Smart Oracles: A Simple, Powerful Approach to Smart Contracts (July 17, 2014),
https://github.com/codius/codius/wiki/Smart-Oracles:-A-Simple,-Powerful-Approach-
to-Smart-Contracts. A prediction market such as Augur could also function as a
distributed oracle. See Pete Rizzo, Augur Bets on Bright Future for Blockchain Prediction
Markets, COINDESK (March 1, 2015, 13:30 BST), http://www.coindesk.com/augur-future-
blockchain-prediction-market/.
350 See Wright & De Filippi, supra note 102, at 50.
Trustless Trust 75
used to create a regular outlet for private dispute resolution, the way so many
business-to-consumer form contracts today push disputes into arbitration.
The distributed nature of the blockchain may call for new enforcement
mechanisms that are themselves distributed.351 For example, new international
arbitration networks might need to be developed that were tuned to the needs of
blockchain disputes, much as the World Intellectual Property Organization
created the Uniform Dispute Resolution Process (UDRP) to handle trademark
disputes over internet domain names.352 Because arbitration decisions could in
some cases be directly executed on the blockchain, and would apply on a peer-
to-peer basis, however, blockchain arbitration systems would be different than
any current example.353 Andreas Antonopoulos and Pamela Morgan proposed a
decentralized arbitration and mediation network (DAMN) for funding to The
DAO in late May 2016.354
Any of these voluntary mechanisms could be baked into blockchain
applications, or even in some cases legally mandated. The full range of
incentives and governance mechanisms could be used to encourage compliance
with desirable approaches. Furthermore, just as the Federal Arbitration Act
directs courts to accept private arbitration decisions when fraud is not involved,
legislation could create similar legal force for appropriately designed blockchain
dispute resolution systems.355
The next form of hybrid legal and blockchain trust involves directly mapping
machine-readable smart contracts to human-readable written contracts. Eris
Industries, a smart contract startup, has developed what it calls Dual Integration
to link human and machine contracts.356 With this approach, the human and
smart contracts explicitly reference one another through digital signatures. In
contrast to The DAO terms of service, which privileged the algorithmic contract
over the human-readable explanations,357 this approach makes each dependent
on the other. A court or other decision-maker can use the conventional contract
to understand the intent of the smart contract, which handles execution of the
agreement.358
Every smart contract will not require a bespoke human-negotiated contract
alongside it. As with the contract system today, forms will be widespread for
business-to-consumer and low-value agreements. In many cases, the costs of
dispute resolution will so far exceed the potential recovery that “quick-and-
dirty” reliance on the naïve actions of machines will be sufficient. Regulation of
intermediaries such as registries may obviate the need to specify legal terms for
every associated smart contract. As blockchain-based systems become more
familiar, a combination of customer, common law, and model legislation is likely
to develop to address common situations.
The final form of legal integration with the blockchain involves legislative
action to recognize distributed ledgers. The Governor of Delaware, for example,
has proposed that Delaware corporations be able to issue shares of stock
VI. CONCLUSION
The Russian cognate of the proverb, “the pen is mightier than the sword” is
the far more colorful, “what is written with a pen cannot be hacked away with an
axe.” The Russian version has a subtly different meaning. It is not chiefly about
the power of the press, or free expression.362 The point instead is that some
expressions are indelible, despite the vigorous efforts of others to destroy them.
A more modern formulation might be, “what is trusted cannot be undermined by
the untrustworthy, or those with power.” That would also describe the ideal of
the blockchain as a trust architecture.
359 Marco A. Santori, Governor Jack Markell Announces Delaware Blockchain Initiative,
GLOBAL DELAWARE BLOG (June 10, 2016),
http://global.blogs.delaware.gov/2016/06/10/delaware-to-create-distributed-ledger-
based-share-ownership-structure-as-part-of-blockchain-initiative/.
360 Stan Higgins, Vermont is Close to Passing a Law That Would Make Blockchain
Records Admissible in Court, COINDESK (May 17, 2016, 18:19 BST),
http://www.coindesk.com/vermont-blockchain-timestamps-approval/.
361 Diana Ngo, France Issues New Ruling for Mini-Bonds Trading on Blockchain
Platforms, BTCMANAGER.COM (May 12, 2016, 16:56),
https://btcmanager.com/news/finance/france-issues-new-ruling-for-mini-bonds-
trading-on-blockchain-platforms/.
362Respect for both has been far more limited throughout the history of Russia than
in the west.
Trustless Trust 78
These are still early days for the blockchain. Satoshi Nakamoto’s Bitcoin
white paper was published less than a decade ago, and Ethereum just launched
in 2015. Even if the grandiose predictions about transforming finance,
government, commerce, and more prove ill-advised, the blockchain has already
produced important discoveries in De Tocqueville’s “science of association”363
Its potential is far greater. Like the internet, the blockchain is a foundational
technology, whose impacts could reach into every corner of the world. To move
forward, though, law and distributed ledgers need each other.
How the story plays out is a matter of trust.
363
See supra note 22.