This week, Kurt Wuckert Jr. hosted a special episode of the CoinGeek Weekly Livestream, where he talked to two guests from the BSV Blockchain Association, Jad Wahab and Marcin Zarakowski, about what it means to run honest nodes and their role in Bitcoin.
The history of honest nodes
Wuckert begins by asking Jad Wahab about the one return bug. This allowed anynodeto act either honestly or dishonestly and reassign anunspent transaction output(UTXO) just by doing it. He asks Wahab to explain this process and why some people think of this as a bug, whereas others see it as a feature.
Wahab describes this as a philosophical thing and says it doesnt make that much difference. The system lends itself to miners becoming huge entities, investing lots of resources into their operations. This incentivizes them to behave morally and legally.
The digital asset recovery tool
Zarakowski starts to answer this with a more philosophical contemplation: he explains what Bitcoin is. He says that while some people perceive it as an anarchistic network where you can send transactions, it is not that.
We dont believe this mantra of not your keys, not your Bitcoin, he elaborates, outlining the BSV Blockchain Associationsposition that the system must operate within the law, including property law.
The Digital Asset Recovery Tool is a toolset or a set of software elements that allow for freezing assets when there is a valid court order. The set of software tools is composed of three elements, he says.
1. First is the node software all miners require this to participate in the network and mine blocks.
2. The second element is a standalone software that operates in conjunction with SV Node software called Blacklist Manager.It automates the process of putting certain UTXOs on the blacklist.
3. The third element has not yet been released. Its commonly referred to as a notary tool. It translates valid court orders into a machine-readable format and broadcasts them to Blacklist Managers run by miners.
Right now, the freezing of digital assets is possible. However, in time, parties with a valid court order will be able to recover digital assets.
On court orders
Wuckert says that as a miner onBitcoin SV(BSV), he has talked to his legal counsel about what court orders to honor. He has said that, obviously, they would not honor such an order from North Korea, but the question remains whether they should honor one from a local jurisdiction. He wonders what it might look like when two jurisdictions disagree.
There is nothing special about Bitcoin that can put it outside the applicable laws, including property law, Zarakowski says. He asks us to imagine we are not talking about Bitcoin at all. He tells Wuckert to imagine he brought his car to the United Kingdom and lent it to someone who refused to give it back. He says Wuckert would simply go to court, provide sufficient evidence that it was his, and get a legal order to return it. While this would not be immediately valid in Norway, for example, most developed countries have processes for the domestication and recognition of foreign judgments.
Circling back to the example of a North Korean court order, Zarakowski says it would only be valid if it had been domesticated and recognized in the United States or another credible jurisdiction.
Delving into what this would look like from a practical standpoint, Wahab explains that there is no creation of new coins. He says to think of a bag that locks thetokens, which can then be unlocked later when the coins need to be moved. He says that, as a matter of fact, miners could already blacklist coins on any chain if they wanted.
Zarakowski adds that a court order from a jurisdiction like the U.S. would probably be enough to cause some publicly traded BTC miners to capitulate. While he thinks theyd put up a legal fight, he doesnt think theyd be successful.
Revolution, counter-revolution, and disagreements
Wuckert sees the potential for a miner civil war breaking out over this. He wonders what this might look like and whoKraken, Huobi, etc., might side with. Zarakowski says that he believes exchanges would abide by the relevant court orders as they are business entities and wouldnt want to accept the risk. He believes this would lead to a paradigm shift that would awaken many BTC advocates to the reality of how the law applies to Bitcoin.
Wuckert wonders what happens if stolen coins are moved on before a court order can be issued. Zarakowski says he isnt sure how this will play out in most jurisdictions. He says to remember that the fact we are talking about Bitcoin doesnt matter the same laws apply as they would to any other sort of asset.
Answering a viewers question on what the point of using Bitcoin is at all if governments can just confiscate it, Wahab asks us to imagine a world where we could have random people stealing coins with no hope of recovery. He reminds us that Bitcoin was not designed to be political and wont solve such issues. It records transactions; it does not govern them.
Wuckert wonders what would happen if all of the nodes colluded to make a change, such as adjusting the difficulty. Wahab replies that all of the controls are legal in nature. For example, they could get sued for damages by parties using the blockchain. He reminds us thatSatoshi Nakamotosaid the rules are set in stone.
Backdoors and cryptography
Wahab wants to address an earlier question Wuckert asked about backdoors and cryptography. He reminds us that Bitcoin is not a cryptographic algorithm but an economic system. Thus, backdoors cant be added as they can in encrypted systems.
By contrast, everything that happens on Bitcoin is logged, and so its publicly visible on the ledger.
Theres no encryption on Bitcoin, he says.
The Set in Stone Narrative
Wuckert says that he has always considered miners as the fiduciary notaries of the system. They receive what they obtain and relay what they can, advocating with the strength of their signal that theyre taking a fiduciary role. However, there are people in both camps saying that whats being attempted here is impossible or technically infeasible. He wants to know what parts are set in stone and whether its possible to be a protocol spec that legally determines what Bitcoin is.
Zarakowski says it would be best to ask Satoshi about this, drawing laughter. Wahab says that some people consider Set in Stone almost religiously, while others see it as a technical thing. He says it is neither. Instead, legal controls keep things set the way they are. As everyone has agreed to a unilateral contract and has used the Bitcoin system with certain set rules, changing those rules leads to legal repercussions.
Wuckert interjects here to say his DMs regularly blow up with accusations that all of these interviews are smoke and mirrors and that everyone ultimately works for Dr. Craig Wright, who is attempting to steal Satoshis coins. Zarakowski responds that the legal recovery process is open to anyone (not just Dr. Wright), so anyone is free to try to beat him to the punch. Secondly, he asks us to see the good side of it: families that know their loved ones had bitcoins but who do not know the private keys will be able to recover what is rightfully theirs.
Nodes and exchanges
Wuckert says that this coin recovery is possible on BTC and BCH as well. He also notes that there are differences in these chains, such as script. He asks Wahab whether this software will be available on these chains. Wahab says he doesnt spend much time focusing on them because they wont last long, but from a technical standpoint, it can be done.
Zarakowski notes that once it is demonstrated as possible on BSV, legal attempts to say it isnt possible on other chains will cease to be convincing.
Closing thoughts
Wuckert wraps this one up with some closing thoughts. He expresses his reservations about new ideas related to Bitcoin. He says there are some things he doesnt like about Bitcoin, but he accepts them as unique, and we just have to deal with them as we have to deal with properties of gold or silver we might not like.
We often have to deal with distasteful realities, and we often have to accept what we cant change. He again calls for Bitcoiners who disagree to see each other as humans and deal with each other respectfully.
Watch: Where does Blacklist Manager (BM) feature within DAR Process Explainer
New to Bitcoin? Check out CoinGeeksBitcoin for Beginnerssection, the ultimate resource guide to learn more about Bitcoinas originally envisioned by Satoshi Nakamotoand blockchain.
Continued here:
CoinGeek Weekly Livestream: Jad Wahab and Marcin Zarakowski discuss honest nodes and their role in Bitcoin - CoinGeek
- To Foil NSA Spies, Encrypt Everything [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- What is cryptography? - A Word Definition From the ... [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- cryptography: Definition from Answers.com [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Cryptography - Wikipedia, the free encyclopedia [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Cryptography - CISSP Domain 07 - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Cryptography Advanced Encryption Standard AES Tutorial,fips 197 - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Faraday Project for Network Security and Cryptography - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- An Overview of Cryptography - Gary C. Kessler [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- An Open Letter from US Researchers in Cryptography and ... [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Gambling with Secrets Part 4 8 Private Key Cryptography - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Gambling with Secrets Part 1 8 What is Cryptography - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Public Key Cryptography RSA Encryption Algorithm - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Public Key Cryptography Diffie Hellman Key Exchange - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Intro to Cryptography - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Caesar Cipher Ancient Cryptography - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- 50 top US cyber security experts write open letter calling for end to NSA 'snoop-ops' [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- Prominent cryptography and security researchers deplore NSA's surveillance activities [Last Updated On: January 27th, 2014] [Originally Added On: January 27th, 2014]
- Obama Stays Silent on Reform of NSA's Crypto Subversion [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Cryptography experts sign open letter against NSA surveillance [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- US crypto researchers to NSA: If you must track, track responsibly [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Java Cryptography Architecture (JCA) Overview - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Cryptography - Part 1 - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Cryptography - Part 2 - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- International Journal on Cryptography and Information Security ( IJCIS) - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Bitcoin Lowdown: Block Chain Cryptography Trumps Human Trust, Deal With It - Video [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- Bitcoin Lowdown: Block Chain Cryptography Trumps Human Trust - Video [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- NSA and GCHQ spoofed LinkedIn to hack Belgian cryptography professor [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Lecture 17: Elliptic Curve Cryptography (ECC) - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Cryptography event - Pravega 2014 - Video [Last Updated On: February 3rd, 2014] [Originally Added On: February 3rd, 2014]
- Lecture 1: Introduction to Cryptography - Video [Last Updated On: February 3rd, 2014] [Originally Added On: February 3rd, 2014]
- US and UK spy agencies accused of swoop on Belgian cryptography expert [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Conceal: Facebook's new Java APIs for cryptography on Android [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Cryptography Apps: How To Keep Your Personal Info Private [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Cryptography Breakthrough Could Make Software Unhackable [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Oi, Android devs! Facebook wants your apps to be more secure [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Lecture 19: Elgamal Digital Signature - Video [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Lecture 18: Digital Signatures and Security Services - Video [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Cryptography 1. List some of the attacks on the Diffie ... [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Cryptography Breakthrough Could Make Software Unhackable ... [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Cryptography: Secret Coding, Spying, and E-Commerce - Video [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Cryptography - Video [Last Updated On: February 9th, 2014] [Originally Added On: February 9th, 2014]
- Public Key Cryptography: RSA Encryption Algorithm - Video [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- Is Bitcoin Anonymous? Arvind Narayanan | Princeton University | Real World Cryptography Workshop - Video [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- A Competitive Study of Cryptography Techniques over Block Cipher - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- How Quantum Computing Will Change Cryptography [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- REALITY LOST - EXCERPT SIX (QUANTUM CRYPTOGRAPHY) - Video [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- Introduction to Cryptography of Bitcoin, Explained! - Video [Last Updated On: February 18th, 2014] [Originally Added On: February 18th, 2014]
- [FOSDEM 2014] USE OTR or how we learned to start worrying and love cryptography - Video [Last Updated On: February 18th, 2014] [Originally Added On: February 18th, 2014]
- Reshif's Cryptography Challenge Solution/Walkthrough - Video [Last Updated On: February 20th, 2014] [Originally Added On: February 20th, 2014]
- [DEFCON 19] Steganography and Cryptography 101 - Video [Last Updated On: February 22nd, 2014] [Originally Added On: February 22nd, 2014]
- A Brief Rundown Of The Spying Questions Intel's CEO Won't Answer [Last Updated On: February 25th, 2014] [Originally Added On: February 25th, 2014]
- DEF CON 8 - Jon Erickson - Number Theory Complexity, Theory, Cryptography, and Quantum Computing. - Video [Last Updated On: February 26th, 2014] [Originally Added On: February 26th, 2014]
- Was YOUR iPhone at risk of being hacked? Bug in Apple update left mobiles open to identity theft for up to 18 months ... [Last Updated On: February 27th, 2014] [Originally Added On: February 27th, 2014]
- Security researchers urge tech companies to explain their cryptographic choices [Last Updated On: February 27th, 2014] [Originally Added On: February 27th, 2014]
- Apple reveals algorithm behind 'encrypted' iMessages [Last Updated On: February 28th, 2014] [Originally Added On: February 28th, 2014]
- Wiliest Ways to Keep the NSA at Bay [Last Updated On: March 1st, 2014] [Originally Added On: March 1st, 2014]
- How to Pronounce Cryptography - Video [Last Updated On: March 1st, 2014] [Originally Added On: March 1st, 2014]
- cryptography in DNS - Video [Last Updated On: March 3rd, 2014] [Originally Added On: March 3rd, 2014]
- Who is the reclusive billionaire creator of Bitcoin? [Last Updated On: March 4th, 2014] [Originally Added On: March 4th, 2014]
- How to say cryptography in Italian - Video [Last Updated On: March 4th, 2014] [Originally Added On: March 4th, 2014]
- Massive Linux security flaw dwarfs Appleās cryptography problems of just last week [Last Updated On: March 5th, 2014] [Originally Added On: March 5th, 2014]
- Security lessons from RSA [Last Updated On: March 5th, 2014] [Originally Added On: March 5th, 2014]
- Visual Cryptography - Video [Last Updated On: March 5th, 2014] [Originally Added On: March 5th, 2014]
- Classical Computing Embraces Quantum Ideas [Last Updated On: March 6th, 2014] [Originally Added On: March 6th, 2014]
- Quantum Cryptography Conquers Noise Problem [Last Updated On: March 6th, 2014] [Originally Added On: March 6th, 2014]
- REALITY LOST Bonus scene 4. Quantum cryptography Founding Fathers. - Video [Last Updated On: March 7th, 2014] [Originally Added On: March 7th, 2014]
- Quantum Cryptography: From Theory to Practice - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- Forcing Trust: Nonlocal Games and Untrusted-device Cryptography - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- TrustyCon 2014 - New Frontiers in Cryptography - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- REALITY LOST Bonus scene 3. Christian Kurtsiefer on hacking quantum cryptography. - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- Nerlens Noel Tweets Date for Potential NBA Debut [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- CISSP SG Cryptography - Video [Last Updated On: March 10th, 2014] [Originally Added On: March 10th, 2014]
- More secure communications thanks to quantum physics [Last Updated On: March 13th, 2014] [Originally Added On: March 13th, 2014]
- New Cryptography Scheme Secured By Quantum Physics [Last Updated On: March 13th, 2014] [Originally Added On: March 13th, 2014]
- History Of Cryptography - Video [Last Updated On: March 14th, 2014] [Originally Added On: March 14th, 2014]
- avc 19 Cryptography x264 - Video [Last Updated On: March 15th, 2014] [Originally Added On: March 15th, 2014]
- Edward Snowden Speaks at SXSW [Last Updated On: April 10th, 2017] [Originally Added On: March 15th, 2014]
- Tor is building an anonymous instant messenger [Last Updated On: April 10th, 2017] [Originally Added On: March 15th, 2014]
- learn cryptography learn the following pkcs refrences - Video [Last Updated On: March 16th, 2014] [Originally Added On: March 16th, 2014]
- [Lec-2][Part-2] Shift Cipher - Symmetric ciphers - Video [Last Updated On: March 16th, 2014] [Originally Added On: March 16th, 2014]