Anatomy of blockchain defects (below): scenario security

In fact, innovative technologies will spread like wildfires, and only in the practical stage will there be limitations. The same is true for blockchain technology.

A new technology, we will find its advantages, and then Imagine can be ideally applied in a variety of scenarios, from personal private clouds to precision poverty alleviation, from original articles to charitable donations, but the actual "killer application" is still Bitcoin and Ethereum are limited to cryptocurrencies in purely virtual economies. According to the survey report, in the world in May, a total of 84 blockchain application projects were disclosed, with 37 in the country. Distributed in the three major areas of finance, traceability, and government affairs, and even new blockchain application pilots such as blockchain electronic deposit platform, housing mortgage loan platform, land acquisition and resettlement fund management, and valuable watch traceability. Although the blockchain system that solves the actual needs in the real society is numerous and full of flowers, it is a small-scale exploration and attempt, and even forcibly manufactures application scenarios. There are very few successful scalers.

Each technology has its limitations, and they will eventually evolve or become obsolete. Since the birth of Bitcoin, the blockchain has come a long way, featuring decentralization, traceability, irreparable modification, unforgeability, non-repudiation and programmability. In the previous media, you can always see the wrong habit of unifying the blockchain and bitcoin, as if the two are basically synonymous. I have hardly heard non-programmers talking about SQL and NoSQL databases, although they have different storage styles for relational and non-relational databases. Blockchain is also a kind of database storage technology, but it is concerned by the public because of the value-added prosperity of Bitcoin. Of course, this is inseparable from the media's help. Any related phenomenon involving cryptographic signature and data reconstruction is placed under the umbrella of “blockchain”. Traditional companies and institutions also find a fashionable buzzword and distort it. It claims to belong to its section.

The book "Block Chain Core Technology Development and Application" published by Mechanical Industry Press believes that the current blockchain technology has limitations in mathematical tools, game theory, cryptography, code, etc., and there is still much room for improvement. The "Journal block security issues: research status and prospects" of the Journal of Automation also comprehensively discusses the security challenges of blockchains facing actual network conditions.

The transaction and block entities in the blockchain data layer involve various cryptography such as public key cryptography, digital signature, hash function, and privacy protection technologies such as component ring signature and zero-knowledge proof, but with quantum computing The rise of existing cryptographic algorithms will face the danger of reduced security or even compromise. Blockchain applications generally lack effective key management technology, and key leakage and loss caused by improper use and storage bring great benefits to digital asset users. The blockchain allows users to have multiple pseudonyms, providing only weaker user identity anonymity. Through transactional profiling and transaction clustering analysis, the true identity of the owner can be inferred based on transaction characteristics. Some cryptographic components may also have defects and vulnerabilities during the compilation process. Transactional extension attacks are often used for attacks against cryptocurrency trading platforms.

The security problems of multiple network technologies included in the blockchain network layer will inevitably bring security risks to the blockchain network layer, including P2P networks lacking identity authentication, data verification, and network security management mechanisms. The network topology of nodes will also be It is convenient for the attacker to carry out the attack, and the association between the network transmission user IP address can also be monitored and tracked.

The consensus layer is the core of the blockchain architecture. According to the basic protocols adopted, it can be divided into five series, including PoW, PoS, Byzantine fault tolerance, fragmentation technology, and trusted hardware. The development of the consensus mechanism on the blockchain is not yet Perfect, there are widespread problems such as incomplete security, unreliable security assumptions, poor scalability, unstable consistency, difficulty in initialization and reconstruction, and different types of consensus mechanisms face different threats.

The incentive layer and the consensus layer of the blockchain are interdependent and jointly maintain the security and stability of the blockchain system. The main problem that the incentive layer needs to solve is the incompatibility of economic incentives, which means that the miners involved in maintenance will not implement A malicious attack that jeopardizes security, but will guide its mining strategy with maximum self-interest. This strategy conflicts with the overall interests of the blockchain, destroying the efficiency and stability of the blockchain system, including self-propelled mining attacks. Nothing at stake attacks, block attacks, and incentives are not sustainable.

The smart contract is the core of the contract layer. It was first proposed by Nick Szabo and later redefined by Ethereum. However, because the smart contract code is open source and involves digital asset transfer, once the code vulnerability is exploited, it will cause irreversible damage. In addition to the text security issues of smart contract creators when designing business logic, the contract layer also faces issues such as smart contract code vulnerabilities, external data source calls, lack of formal verification, and difficulty in implementing privacy protection.

The application layer refers to the blockchain technology has a wide range of application scenarios in the fields of finance, supply chain, energy, etc. As a blockchain hierarchy that directly interacts with users, it is generally required to have an API interface, a cross-chain heterogeneous and Regulatory technology, and currently seems to face problems such as cross-chain operation difficulties, lack of regulatory technology and application layer attacks.

In summary, we will always “perfect” the blockchain technology. In the eyes of economists, cryptographers, and computer scientists, there are still many areas for improvement in blockchain technology.

Blockchain is an undeniable ingenious invention, but there are also a lot of deficiencies that plague technical experts and industry practitioners, including security, performance, cost, energy, privacy, supervision, redundancy, complexity, loopholes, speculation, and original data. Pseudo. Undoubtedly, the inherently liberalized technical features of the blockchain will also lead to contradictions and conflicts between the game of ideals and reality and the inner workings of the real society.

How to make full use of the new technical characteristics of blockchain, explore realistic scenarios suitable for blockchain technology, and obtain data from the underlying blockchain data structure, cryptography, communication network, consensus game, economic incentives and programmable contracts. Breakthrough and gradual innovation have made the blockchain technology truly land, which is the common ideal and task of the industry.

Please also read the same series of articles:

1. Analyze the defects of blockchain (top): impossible triangle

2. Anatomy of blockchain defects (middle): tool cost barriers

Article source: Youyou Finance

Author: Fu Hui

We will continue to update Blocking; if you have any questions or suggestions, please contact us!

Share:

Was this article helpful?

93 out of 132 found this helpful

Discover more

Bitcoin

Interview with Mysten Labs Product Director Why is Sui's technology particularly suitable for enterprise services?

Recently, we interviewed Lola Oyelayo-Pearson, the Director of Business Products at Mysten Labs, to explore how block...

News

Vitalik: To achieve large-scale adoption, Ethereum must undergo three transitions: L2, wallets, and privacy.

As Ethereum transitions from a young experimental technology to a mature technology stack that can truly bring open, ...

Blockchain

What do you think about the upcoming MEME token launch by Memeland? Are you excited or worried?

Despite facing numerous challenges, Memeland has still broken the myth of bear market and paved a path to success. Wi...

Opinion

Outlier Ventures What pain points does the Web3 marketing model solve?

This article is from Outlier Ventures, a Web3 VC based in the United States. It introduces the differences between We...

Market

Understanding the Current Status and Future Development Direction of Blockchain Data Business with One Article

Original Title Using Abstract Thinking to Interpret On-Chain Data for Business Development Over the past 14 years, b...

Opinion

Curve rescue the nation? A detailed explanation of how Opensea's new Deals feature solves the liquidity problem of NFTs.

The author verifies its working principle and effectiveness through experiences, introductions, and analysis, and als...