BLOCKCHAIN
Bitcoin and other cryptocurrencies received a lot of
criticism during the last 9 years. It is not surprising that this criticism
came from organizations that are threatened by the crypto revolution (Banks, government, central banks, finance companies, etc.).
Nevertheless, it is very surprising to hear criticism from economics schools,
which oppose central banking and advocate free choice in currencies (such as the Austrian school of economics).
Unlike the ordinary criticism (that Bitcoin is a scam, a bubble, etc.), which
can easily be refuted, the criticism of part of the Austrian school economists are based on interesting arguments, which
requires a different level of explanation. For example, it was claimed that
Bitcoin should be worthless; otherwise, it contradicts Mises’ regression theorem. The object of the chapter is twofold:
first to explain why the criticism is unfounded and second to analyze the
origin of the value of Bitcoin and other crypto-coins from the perspective of the Austrian school of economics. In
particular, it is explained that Bitcoin does not contradict the regression
theorem for two reasons. First, the initial value estimation can be a random event, and second, the Bitcoin network (even now) has
a nonmonetary value.
Blockchain is a digital ledger in which transactions made in Bitcoin or another cryptocurrency are recorded chronologically and publicly. Bitcoin is a decentralized peer-to-peer digital crypto currency that is powered by its users with no central authority or middle men. The Bitcoin network shares a public ledger called blockchain. This ledger contains every transaction ever processed, allowing a user's computer to verify the validity of each transaction. The authenticity of each transaction is protected by digital signatures corresponding to sending addresses, allowing all users to have full control over sending Bitcoins from their own Bitcoin addresses. In addition, anyone can process transactions using the computing power of specialized hardware and earn a reward in Bitcoins for this service. This is often called "mining" is the process of spending computation power to secure Bitcoin transactions against reversal and introducing new Bitcoins to the system.
Bitcoin is based on three technologies: the Internet,
encryption methods, and the new blockchain technology. Unlike these
technologies, the Bitcoin revolution was both a technological revolution and a monetary one. It completely changed the monetary
world, and it seems that its invention opened a Pandora box, whose effect
cannot be underestimated or predicted.
While some cryptocurrencies or tokens do seem to be a Ponzi
scheme, Bitcoin is definitely not. Everything about Bitcoin: its algorithm, its
network, and its development projects are completely transparent. The network, the mining process, and the entire
project are all decentralized. There are no managers, no organizers, and no
control. Therefore, there could be no fraud. Bitcoin is a decentralized network, where all the Bitcoins’ owners have
the same status. Moreover, the founders of a crypto network may not even own a
share in this network, or they can sell their share, if they have one. they are backed by nothing: “They are neither
backed by gold nor are they backed by governments.” crypto advocates that
Bitcoin is backed by proof-of-work, or, that it is backed by energy or by the mining’s electricity. The essence of the
blockchain technology is the creation of scarce digital assets. That is, the
blockchain creates artificial scarcity. Bitcoin is a global, decentralized, highly liquid, and pseudo-anonymous asset.
Therefore, in any transaction, which requires all these properties, the
benefits of using Bitcoin over other currencies are clear. Moreover, that is exactly the reason that most people do not
appreciate these properties. First, most people are unaware of the damage
caused by centralized monetary systems. Second, only rarely do they perform international financial transactions
in large volumes. Third, most people are against anonymous transactions.
A similar reasoning appears in a different argument against
Bitcoin: The Bitcoin mining costs are extremely high, and even now, its
electricity consumption is equal to that of a small country (like Ireland). Within several years, the costs would be gigantic,
and it would be unprofitable to mine additional coins. At any given time, the
users of the Bitcoin network are the ones who determine the amount of money they are willing to invest in the
network security. That is, first, the mining cost cannot increase beyond the
amount the users are willing to pay, and second, the electricity cost is not a wasted investment; it is a measure of the
network security. The more people trust the Bitcoin network, the more they are
willing to invest in it.
The newly created random symmetric key may, in turn, be used
in employing efficient advanced encryption standard (AES) over a single
communication link. Unlike the functions used in asymmetric
encryption, AES is crafted, rather than relying on number theory challenge, and
believed to imply quantum-safe encryption. The key length should still be
carefully selected to accommodate the quadratic speedup of search of Grover’s
algorithm. Note that secure hash algorithms (SHA) are crafted, similarly to
AES, and are also believed to be quantum safe, reducing the risk of finding an efficient number theory solution for
a natural problem, such as discrete logarithm.
Thus, Lamport’s signature can employ secure hash function,
such as SHA. The use of Merkle trees with multiple private keys in the leaves
(leaves that can also be produced by several nested hash functions) and the root of the tree serving as the public
key yields an efficient, quantum-safe signature scheme.
Abstract
The need for a quantum-safe Internet is emerging, and this
is a great opportunity to re-examine the legacy of public key infrastructure.
There is a need for perspective on the evolution of cryptography over the years, including the perfect
information-theoretical secure schemes and the computationally secure schemes,
in particular. There is also a need to examine the evolving Internet infrastructure to identify efficient design and
secure cryptographic schemes over the existing Internet infrastructure. A
combination of overlay security, blockchain, and Merkle trees with Lamport’s signatures offers just such an easily
implementable quantum-safe Internet.
1. Introduction
Securing the digital world is essential as critical
infrastructures are based on communicating with remote computers. The trust in
the computer network is based on having a secure and authenticated communication. The change in social activity,
where the big four companies Google, Amazon, Facebook, and Apple (GAFA)
influence many aspects in modern society implies the need for secure computer and network infrastructures. The
past interest in quantum cryptography has grown significantly in recent years.
National Institute of Standards and Technology (NIST) authors wrote an overview on the subjects in 2009 [25], and
the activity expanded dramatically, having dedicated conferences on the subject
[27]. The most challenging component of Internet security that needs to be considered is the replacement of
the existing asymmetric encryption scheme, namely, to replace an RSA [29]. For
this there are several candidates: lattice-based cryptography (e.g., shortest vector problem, closest vector
problem), code-based cryptography (e.g., McEliece, Niederreiter), and more
(see, e.g., [24]). The second challenging task is a replacement for signature scheme; here hash-based Lamport’s
one-time signature together with the Merkle tree is believed to address that
need (see [39] for an overview). The integration of the post-quantum cryptographic ingredients into a complete
infrastructure are also challenging (as we detail in the sequel).
We present a design for quantum-safe communication over the
existing Internet infrastructure. No hardware changes are required, only
software updates over the heterogeneous Internet architecture. Different aspects of the solution are
presented in the sequel
2. Quantum computing today
The emergence of quantum computers is a beyond the
commercial non-universal commercial quantum computer of several thousand qubits
(quantum bits) of D-Wave IBM commercializes 50 qubits quantum computers. The quantum
computer race leads to exponential growth in the number of qubits, where in
2018 Intel presented 49 qubits quantum computer and Google announced 72 qubits computers. In addition,
several startups including Rigetti announced a 36 qubits quantum computer and a
quantum processing unit.
Many quantum computers restrict the qubits that participate
as inputs for quantum gate operations and employ qubit teleportation to allow
quantum gate operations over non-neighboring quantum bits. The advance in techniques for producing
entangled qubits and teleportation may assist in using several quantum
computers to cooperate on a task by teleporting qubits from one to another, thus building a virtual quantum computer with the
needed qubits for the task. In particular, for breaking the asymmetric
encryption schemes in use almost immediately, much earlier than estimated.
3. Quantum algorithms
Shor’s algorithm designed for quantum computers, changed the
way modern cryptography and Internet security are captured. New algorithms for
quantum computers are frequently invented.
Computationally secure cryptography is based on the unproven
assumption of the existence of one-way function, a function that can be
computed easily but is hard to be inverted. The risk that an algorithm that breaks a considered one-way function will be
found always exists, e.g. Even one-way functions proposed for post-quantum
cryptosystems are at risk of the discovery of new efficient inverse algorithms. One famous example of an open
problem for decades is the primality test that had no polynomial deterministic
algorithm, until just such an algorithm was found.
4. Perspective on encryption
The asymmetric encryption schemes, proposed by Merkle,
Diffie and Hellman, and Rivest et al, revolutionized cryptography. The idea to
use computational tasks in order to establish a symmetric key started with the suggestion of Merkle to use computation
puzzles. Merkle’s puzzle scheme started with Alice choosing at random many
computation puzzles, possibly hashed random numbers (With tuned lengths) each concatenated with a sequence
number, such that bob is able to randomly choose one of the puzzles and reverse
this number in reasonable time. Then, Bob sends a few of the bits of the revealed random number back to Alice,
identifying the puzzle Bob decided to solve. Both Alice and Bob will be using
the unrevealed bits of the solved puzzle as their symmetric key. Eve on the other hand will not know which of the
puzzles was chosen by Bob, will likely have to solve many puzzles before
identifying the puzzle randomly chosen by Bob, and revealing the symmetric key they use. Later Diffie and Helman and then
Rivest, Shamir and Adelman suggested more efficient schemes based on number
theory assumptions.
Asymmetric encryption enabled the creation of a symmetric
key among communicating parties over tapped communication links and is even
able to identify the intervention of malicious parties in the communication. The identification of such
malicious parties was due to the capability of to sign certificates that
monolithically associated a public key with the entity identity description to which the public key belongs. The signature
was issued by a trusted third party, the certificate authority. This public key
infrastructure is the de facto security infrastructure today, securing Internet activity, including military,
governmental, social, financial, and, in fact, all activities in the Internet.
Thus, the appearance of quantum computers and fitting
quantum algorithms, which may break the basic mathematical foundations of, has
great implications. Post-quantum cryptosystems are examined, e.g., replacing the believed to be one-way
functions that are currently used by other functions, which are also believed
to be one-way functions. Provable perfect encryption does exist, namely, encryption based on the classical one-time paid,
as long as the one-time pad is a true random sequence. True random sequences
are possibly produced by the use of quantum effects, e.g.
Another difficulty in using one-time pad is the need to
share the one-time pad prior to communication. The one-time pad can be shared
prior to communication by physically delivering a copy of the one-time pad.
Distribution of a one-time pad to many users may risk the loss or duplication
of one copy of the one-time pad, nullifying the secrecy of the encryption.
Quantum key distribution suggests using quantum bits
superposition for detecting a tapper in the communication of random bits;
however, this scheme can only be used in direct links of at most 100 km. Recently, succeeded
in using satellites and quantum bits entanglement to share a key over longer
distances. This key can be viewed as a short one-time pad, as the rate of the
received random bits are limited. One difficulty is the need to
mobilize the symmetric key received from the satellite in one satellite
receiver to the actual place the key should be used and the fact that the key authenticates the satellite receiver, but may not yield
the identification of other users.
5. Overlay security
Occasionally, one needs to send a credit number
electronically, sending one email with the first digits of the credit card and
then another email with the rest. Still, the email servers and the Internet server providers may act as a man in the middle and
tap in, capturing part or all of the digits of the credit card. It is possible
to send a random string (one-time pad) via WhatsApp (owned by Facebook) and the bitwise x-or of the credit card with
the random string via Gmail. On one hand, this resembles sending entangled bits
in two channels. On the other hand, just like content distribution networks (CDN), e.g., Akamai, that uses overlay
network of the Internet ISPs as their source for extra reliability and
services, overlay security uses the accumulated secrecy, authenticity, and identification of the diverse capabilities
of the communication channels, applications, and protocols.
The maturity and evolvement of the Internet technology
enabled the CDN company to use the Internet infrastructure as a playground for
delivering contents at will. In the last decades, more and more communication channels identify, authenticate, and
secure the communication between entities. Email, SMS, push notifications, and
messengers (WhatsApp, Facebook Messenger, Skype, Snapchat, LINE, LinkedIn, Telegram, Weibo, Slack, etc.) form
logical secured channels. Each of the channels, even if they use the same
physical channel, implies already built trust in the identification and authentication of the entity communicated
through the channel. Moreover, the maintenance and repair of the security of
each channel are guaranteed by the channel supplier.
Still, each channel may act as a man-in-the-middle
accumulating the communications transmitted through the channel servers. The
use of a random one-time pad over channels nullifies information accumulated by the server of each channel.
This is the current playground suggested to be used by the
overlay security concept, to create a symmetric key based on perfectly secure
information-theoretical secure scheme, namely, quantum-safe replacements for asymmetric encryption. In addition,
the security of new channels can be obtained inductively by the security of
existing channels, employing them to create a random shared key for the new channel.
6. Redundancy and secret sharing
Overlay security uses several channels and random numbers to
obtain a high level of confidence in identification, authentication, and
secrecy, a level implied by all the used channels. However, if one of the channels, say Android push notification, is not
available (possibly in China), then the communication is blocked. Secret
sharing schemes imply a tunable threshold for the number of channels needed to reconstruct the secret. Shamir secret
sharing is based on polynomials over a finite field, where each participant, in
our case channel, receives one point of the polynomial and the secret is the free coefficient of the polynomial. For
example, if the polynomial is a random linear function with the secret being
the free coefficient, any two participants/channels can reveal
the secret, but a single participant/channel has absolutely
no information on the secret. Polynomials with greater degrees used over many
channels may imply more trust in the aggregated identification, authentication, and secrecy while allowing
several of the channels to be blocked or even to corrupt the information
conveyed through them.
7. Authentication Bay
Identifying and authenticating an entity in the physical
world by the digital world are the biggest challenges in information security.
Having secured robust and reliable identification and authentication of a person, an institute, a company, or a
device are the first chain in securing digital representation and processing of
information. For example, a bank client needs to be identified and authenticated for performing digital operations on their
account. The linkage between the physical entity and the digital representation
of an entity allows processing of digital and physical assets in the computers and the Internet.
The need for identification and authentication of an entity
started before computers exist. Certificates signed by trusted authorities were
used by governments to monitor the activity of the society, to enable law and order. Certificates used to
authenticate entities were and are part of business infrastructure. The
procedures used to authenticate an entity were and are defined by societies. A newborn child does not need a certificate to be
born, obviously when the child is born at home. Moreover, a newborn may not
have a certificate with identifying details, including identifying number, without enforcing society’s regulations.
Some societies pay parents of newborns when they register the child, an
attractive payment that almost ensures that newborn will be registered.
In the scope of people, biometric identifications, by using
fingerprints, face recognition, iris, and palm, are becoming standard. The
identification starts with the registration process in which there is a need to identify and link the person with the biometric
information recorded during the registration process. This is an error-prone
process that encapsulates the challenge in the authentication bay. There is a need for a trusted authority
(e.g., government, banks) or trusted manufacturer (e.g., Apple, Samsung) to
collect biometric samples while authenticating the person by other means (e.g., driving license, passport) and
digitally link them in a digital record. The actual biometric sampling would be
better stored in a form of one-way hash, just like passwords; otherwise, they can be copied and used without the actual
involvement of the biometric identification device (e.g., fingerprint reader,
camera). Keeping the biometric database private and secure is another challenging task, as once a biometric data is
leaked to untrusted entities, the search for confusing biometric data to fake
identification can be feasible.Moreover, current technologies for identifying a person
biometrically are not perfect. Biometric identifications have false positives,
when a non-authorized person is identified as another authorized person and performs an action they are not
allowed to perform. Biometric identifications also have false negatives, when a
person is not correctly identified as the person registered and cannot perform actions they are authorized to take. DNA
identification will also be possible in the near future; still identical twins
share the same DNA.
Having unique attributes is only one facet of the
identification and authentication process, as there should be trust in the
digital identification and authorization process. For example, consider a program identifying a person having DNA linked to the
registered digital record of a person with a certain identity number, and then
send an approval on the check. There are several questions to ask on the program actions. Does the program have the means
to verify that the input device (e.g., fingerprint, camera) observed the
person, or is it a mock-up? Were the input device being compromised and a
replay attack performed? Another question is whether the program verified the
collected data from the input device against the right registration record or
was maybe hacked to output approval with no actual checking. This chain of
trust is yielded from the trust in the biometric device producer. In the
framework of the Internet of Things (IoT), the identification of things is even
more challenging, as devices and items tend to be produced identically. Vehicle
networking is now emerging, and the means to identify a car (by another car) is
one of the basic ingredients that the trust vehicles have in inter-vehicle
communication. Recent works suggested to monolithically sign the car
description (e.g., driving license, color, and brand) and the public key
associated with the car description in one monolithically signed certificate.
The signing authority can be the governmental vehicle registration [10]. The
car description should allow for a unique identification by means of an
out-of-band channel such as a camera. Note that the identity of a device can be
challenging; for example, consider two cars of the same model; if one exchanges
the doors of these cars, does that alter the identity of the car? What about
changing the engine? And so on.
Another possibility for identifying IoT devices requires
trust in the producer, which embeds a unique serial identification number, A
unique identifying numbers in unaltered barcode, QR code, RFID, and ROM that can be used as part of the identification
and authentication process.
The cloud and blockchain infrastructures enable a new
opportunity for representing each person, entity, and organization by a digital
avatar. The avatar, being a digital historical record of events, digital assets, and procedures/functions defined to be
executed upon given events. The identity linkage between the avatar and the
physical entity accumulates trust over time, letting the physical entity monitor the possibility of identity theft, as
recorded actions for the avatar can be examined by the actual entity
represented by the avatar.
Fake avatars already exist, and they are represented by
profiles in social networks, Facebook, LinkedIn, etc., and may interact with
persons as bots do. This is one light form of identity theft where-there may be no real entity linked to the avatar. Identity
theft has been a trust problem in societies from the years of the bible where
Jacob represented himself as Esav to Itzhak. Nowadays, the remote actions enabled in the digital interaction make the
identity theft phenomena a major concern.
In some cases, e.g.,
cryptocurrency, anonymity is an important aspect, as cash money, or digital money,
appearing in an account had better not carry its history. Thus, every coin or
bill having an identical value. Blockchain associates an account with a public
key, where the matching private key is held by the owner of a wallet. This
somewhat anonymous linkage between an entity and digital assets is only by the
means of the private key. The vulnerability of such a solution erases the
famous cases of lost/stolen private keys.
Private keys are also a means to sign transactions binding
the holder (even in court) to the transaction; thus, the way to secure the
private key, possibly in enclaved memory, is very important.
Moreover, having a quantum-safe signature is a must, as the bidding
is a very important aspect of the trust infrastructure, and if the bidding is
broken, deniability of actions is possible. A client that transferred a million dollars from their account may
rightly claim that someone else preformed the transfer to this account on their
behalf, with no permission.
Another aspect of the authentication bay is the usage of
passwords. The illusion that passwords can contribute to the security of the
communication is misleading. Many of the passwords are subject to dictionary attacks. Users tend to forget and
manage passwords in vulnerable storage, leading to many password lists being
sold on the black net. The typical password renewal procedure involves password reset invocation and a temporal
password sent through email. Such single channel security is another weak chain
in the security infrastructure, a weak chain that may dramatically benefit using the multichannel security and
authenticity yielded from the overlay security concept.
8. Distributed trust, blockchain, beyond social identity
Certificate authorities are a major source of trust for the
public key infrastructure. The certificate authority identifies an entity and
signs a certificate that associates a public key with the entity description. The history of the Internet testifies to
examples of the vulnerability of the trust associated with certificate
authorities. For example, private keys that were used to sign certificates were stolen, and significant percentage of the Internet were
not secure. Recently, Estonia, Canada, and other countries started to use
distributed trust among several trusted and heterogeneous entities as a source for identification. Such
distributed trust is enabled by blockchain technology. Identity, verified by
several trusted entities, possibly including governmental, financial, and notary entities, among others, is logged in a
distributed fashion.
To communicate with an entity, a search of several
participants in the distributed ledger returns contact information for the
entity. Using the communication channels in the contact information and secret sharing enables the creation of a symmetric key.
The newly created random symmetric key may, in turn, be used in employing
efficient advanced encryption standard (AES) over a single communication link. Unlike the functions used in asymmetric
encryption, AES is crafted, rather than relying on number theory challenge, and
believed to imply quantum-safe encryption. The key length should still be carefully selected to accommodate the
quadratic speedup of search of Grover’s algorithm [13]. Note that secure hash
algorithms (SHA) are crafted, similarly to AES, and are also believed to be quantum safe, reducing the risk of finding
an efficient number theory solution for a natural problem, such as discrete
logarithm.
9. Quantum-safe signatures
The ability to perform a transaction in an undeniable
fashion over the Internet is important, especially when financial transactions
are executed. Lamport’s one-time signature [21] is not tied to a particular one-way function. Thus, Lamport’s signature can
employ secure hash function, such as SHA. The use of Merkle trees with multiple
private keys in the leaves (leaves that can also be produced by several nested hash functions) and the root of
the tree serving as the public key yields an efficient, quantum-safe signature
scheme.
In greater detail, the private key is an array of pairs of
random numbers. The first random number pair is used to sign the first bit of
the message; the second random number pair is used to sign the second bit of the message and so on. Note that, for
reasons of efficiency, typically, the hash of the message is signed instead of
signing the longer original message. Each random number in each pair is hashed (in fact, any other one-way functions
can be used instead of hash), and the resulting array of hashed values serve as
the public key. Once the public key is published in a way that links the signing entity to the public key, the
construction can serve in signing any single binary string, a string that may
be the hash of the original message to be signed. The actual signature is a sequence of random numbers from the private key, one
from each pair, attached to the message to be signed. The first random number
in the signature is the first (second) random number in the first pair if the first bit to be signed is zero (one,
respectively). Similarly, the second random number in the signature is the
first (second) random number in the second pair if the first bit to be signed is zero (one, respectively) and so on. Since the
array of numbers in the public key are results of one-way hash function, no one
but the producer of the public key is able (under standard computation assumptions) to know and expose the right
portions of the private key. Hence, the signature is binding.
Still, the need to identify an entity and associate the
entity to the public key is the most challenging stage in authentication.
Lamport’s signature essentially requires such an identification process for each signature. Fortunately, many of Lamport’s signatures
may share a single public key, which consists of the roots of Merkle tree, one
tree for each position of a random number in each pair of the private keys. The first positions, representing the
private keys used to sign a zero value of the strings, consist of random
numbers, such that such numbers belonging to the first two private keys are concatenated and hashed to yield the value of their
common parent in the first Merkle tree. Similarly, for the second positions,
the two random numbers are concatenated and hashed to yield the value of their parent in a second Merkle tree and
so on. The parent of any such two leaves is concatenated to the hash obtained
from the next two random numbers that reside in the same positions in the next two private keys and hashed
yielding the value of the grandparent of these four values and so on.
A signature will use one of the leaves, where each leaf is
connected by a path to the roots of Merkle trees, one tree for each random
number in the leaf. When using a leaf to sign, the appropriate random number in each pair of the leaf is exposed together
with the missing hash values that are concatenated in each level of the tree. Thus,
allowing the verifier to check that indeed any revealed random number leads to the corresponding value of
the Merkle tree root public value.
The root value may be stored with the contact information
that resides in the blockchain. The contact information with the public value
of the root will be added to the distributed ledger after the blockchain participants verify and approve the identity of
the contact information and root value owner.
Nowadays, every other crypto company wishes to launch their own coin with their own brand name; so, quite naturally, with the growing influx of new investors in the market, the more advanced and secured cryptocurrency wallets is on the rise.
Cryptocurrency hardware wallets are quite popular among investors since they provide advanced security. They provide facility to store private key offline and away from the internet. Which reduces their high chances of getting hacked.
There are some popular hardware crypto wallets are:
Ledger Nano X, Trezor Model T, Steel Bitcoin Wallet, Ellipal Titan, SafrPal S1, CoolWalletPro, Ledger Nano S, D'Cent Biometric Wallet etc..few to name it.
Conclusion:
Overlay security
combined with distributed trust forms an immediate quantum-safe alternative to
the public key infrastructure. The existing technologies enable the use of
multi-logical/multi- physical channels to
create a random secret at will, use of the blockchain distributed ledger as a
replacement for single point of failure trusted authority, and to produce
quantum-safe signatures.
Bitcoin is not a scheme; it is a great monetary invention,
which has a clear economic value. It cannot and should
not be banned by governments. In fact, any government’s manipulation and
regulation emphasize and increase the need for cryptocurrencies. Criminals are
not the only ones who see the benefits in using cryptocurrencies. In the third
world (e.g., Venezuela and Zimbabwe), cryptos are lifesavers. In general,
cryptos are extremely valuable wherever censorship resistance is required, and
in a global market economy, that fact creates value for everyone. Bitcoin does
suffer from infancy problems (high volatility and high transaction costs);
however, these issues are not fundamental and will be resolved eventually (we
already see many signs for that). The fact that the crypto market exceeded
800B$, despite these issues, only emphasizes the need of the markets in them. The energy which is spent in crypto mining
is not a wasted energy. It is the source of the network’s security which
increases the trust in the system, and in a market economy trust is a very valuable commodity. The easiness in the
creation of new coins is not equivalent to fiat money inflation. Fiat inflation
is a counterfeiting process, while the creation of new cryptos is equivalent to the creation of a new invention, which may be
better, but it has to surmount the former coins’ network effect. Bitcoin does
not contradict any economical law. In particular, it does not contradict Mises’ regression theorem for two grounds:
first, Bitcoin was valuable for the first miners even before it was used as a
medium of exchange, and the regression process can be kindled by any subjective whim; second, even now. Bitcoin
has a nonmonetary value (just like gold) as a “real-estate” on the Bitcoin
network.
No comments:
Post a Comment