Criteria: Distributed ledgers must provide privacy infrastructure to shift the dial meaningfully on social scalability, where privacy enables the ability to achieve self sovereign identity, empowering the end-user. The degree to which the privacy implementation adheres to the self sovereign identity principles without impeding user participation will determine the extent to which the network can socially scale.
Privacy is the simple ability to protect ourselves from outside influences and intrusions. This extends beyond protecting your data in a hyper connected world, to even the simple concepts such as privacy of space, time and thoughts.
Privacy has always been intrinsically tied to our existence and interaction, the need for it waxing and waning with the evolution of human progress. As individuals we ceded trust and privacy to small degrees but to known participants by joining groups (tribes) that afforded us the ability to “[lower] cognitive costs while increasing the value of information flowing between minds, reducing vulnerability, and searching for and discovering new and mutually beneficial participants.” (Nick Szabo)
As we sought to continue expanding for greater value we pushed the limits of tribes through innovations, technological or otherwise, allowing us to scale information flow from a few connections to millions. The internet has further heightened the scaling to billions, creating a hyper connected world that requires participation in the form of a digital life, leveraging self-interested actors to create mutually beneficial relationships which benefit the broader network. However, in such a world, even minimal participation in a digital life requires giving information to unknown third parties. This requirement and our desire for greater value through scaling has led us to cede a far greater degree of trust and privacy than what we should be comfortable with.
It should be noted that in order to assist social scalability to even greaters heights and values, rectifying the trust required aspects of our society is an important paradigm shift to consider. Trust minimization attempts to eliminate the vulnerabilities associated with potential harmful behaviour that network participants, outsiders and intermediaries may instigate – cultivating a secure environment for scaling. Blockchain and DLTs have been able to provide this aspect of trust minimization.
“Satoshi’s breakthrough with money was to provide social scalability via trust minimization: reducing vulnerability to counterparties and third parties alike. By substituting computationally expensive but automated security for computationally cheap but institutionally expensive traditional security”(Nick Szabo)
Whilst the predominant direct social scalability benefit of blockchains is trust minimization, we still have to address privacy.
“Another way to estimate social scalability is by the extra benefits and harms an institution bestows or imposes on participants, before, for cognitive or behavioral reasons, the expected costs and other harms of participating in an institution grow faster than its benefits.” (Nick Szabo)
For example, the internet allowing for hyperconnection through participation in a digital life increasingly sees the benefits we gain from connectivity compromising our basic rights to privacy. While at present, privacy can be layered on top of our digital lives as a series of measures we can take, “each of these measures almost inevitably denigrates in some way the online experience, making it less convenient or even impossible to make commercial or social transactions.” (Giovanni Buttarelli) Essentially this limits participation to achieve privacy, where freedom of participation is the crux of social scalability. Therefore It is important then that any innovations that we implement to scale socially, DLTs inclusive, must equally address privacy as a core requirement without compromising participation.
While a completely trustless and privacy adhering network eliminates impediments to participation and information flow, ultimately allowing for indefinite social scalability, it is largely improbable that we will ever achieve such an absolute state. However, with privacy applied on top of DLTs, we are best positioned to shift the dial on social scalability with current technological capacity.
In the modern landscape where the digital life is all pervasive, the protection of personal data becomes the core tenet of Privacy. To briefly indulge in an oversimplification, individual identities can be thought of as a comprehensive amalgamation of our personal data and information. Such identity forming data then weaves the social fabric, intrinsically tying identity to social structures and functions making identity inseparable from social scalability.
It is then not surprising to discern that the nature of identities has also evolved along with the advancements in social scaling throughout our history. Just as social participation evolved from tribe or clan based interactions to the sizeable possibilities offered by the internet, so too have the defining elements and scope of our identities. The internet’s innovation of “user-centric designs turned centralized identities into interoperable federated identities with centralized control” (Christopher Allen).
Within the innovation of the internet itself, we saw a paradigm shift from identity authentication by centralised authorities and organisations towards user-centric identities which cede more control to the user in the form consent. However, despite ceding a certain degree of autonomy to the user, meaningful participation still requires the users to relinquish their identity to third parties that could collect, store or distribute information.
The next step in the evolution to protect our personal data is to empower the data subject with a self sovereign identity. Self sovereign identities enable users to independently own, store and transact their data in order to meaningfully participate without ever having to cede their personal information to a central repository or identity storage. “Rather than just advocating that users be at the center of the identity process, self-sovereign identity requires that users be the rulers of their own identity.” (Christopher Allen).
The defining traits of DLT’s – trustlessness and immutability – offer the fundamental means by which we can achieve a network of self sovereign identities; the best case scenario for protecting personal data in the current landscape. However, the technology is still evolving to both guarantee network immutability and trustlessnes while providing privacy and security for the individual.
At present there are no privacy tools that fully comply and cater to the requirements of a holistic privacy solution for DLTs. Among the existing tools that are being developed, technologies that leverage homomorphic encryption to achieve obfuscation of data on blockchains are leading the debate on the most effective method. The breakdown of the leading technologies such as ZK-STARK, zk-SNARKs, SMPC, and Ring Signature, currently solving for the privacy layer and the extent to which they are able to do so will be discussed in an upcoming article.
The concept of self-sovereign identity follows certain guiding principles that inform the holistic framework for data protection; ensuring that user autonomy remains at the heart of privacy. The ability of privacy tools on DLTs to observe these principles will essentially determine the extent to which they can successfully cater for privacy without impeding user participation – continuing to propagate social scalability.
We will refer to Monero’s ring signature based privacy model, presently one of the most tested DLT networks as an example to demonstrate the industry’s current standing in fulfilling the principles required to achieve self sovereign identity.
While the above principles are commonly acknowledged and supported by privacy projects as well as regulatory bodies, the biggest point of contention surrounding privacy remains that it may condone bad actors and malicious activity. With the added layers of privacy provided by complete obfuscation technology, existing methodologies of protecting participants from bad actors in the legal system become less effective.
However, in face of this concern it is important to bear in mind the increasingly detrimental effects society and individuals are exposed to as we continue to relinquish our privacy in exchange for a false sense of security. It would be lacking in foresight to continue compromising privacy in apprehension of a minority bad actors.
“ if we were going to empower a bunch of humans, are they going to use their power more for good or more for evil. …if we empower billions of humans they will use it much much more for good, they will protect each other from poverty and disease and they will support their families. They will do for each other through economic exchange what they have already started to do with the internet.” – Zooko Wilcox, founder and CEO of the Zcash company. (Unchained)
The decisions made today about privacy will have enduring implications for the future of governance and society. To concern ourselves with it now, when it is easy to disengage with the debate on security and data control will meaningfully shape our participation in society and define the trajectory of how we scale.
© 2018 Spec-Rationality.com | All Rights Reserved.
Get our major updates directly to your inbox. Leave your details below.