As Ordinal inscriptions approach the 150,000 mark, blocks larger than 3 MB have become commonplace, with many blocks near the 4 MB range. Meanwhile, after the average transaction fee on-chain rose 122% higher at the beginning of February 2023, the average fee has remained the same over the last few weeks and is currently coasting […]
- Home
- encryption
encryption
‘Privacy has become a taboo,’ says crypto anarchist project DarkFi
A group of pseudonymous developers from DarkFi spoke with Cointelegraph on how crypto is evolving amid privacy challenges, bad actors and government oversight.
The first critique of centralized authority was introduced by Pierre-Joseph Proudhon in 1848, a few years after publishing his now-classic book What is Property?, calling for the abolition of property and the state. As per Proudhon's view, without economic change, any political change would be limited.
His work is at the heart of anarchism, "a political theory that is skeptical of the justification of authority and power," according to the Stanford Encyclopedia of Philosophy. Almost two centuries later, Proudhon's thoughts about economics and power still echo in society, with encryption tools paving the way for parts of the ideal society envisioned in his theory.
Cryptocurrencies may be far from its original political principles, but projects reviving cypherpunk values are still thriving. DarkFi is one example. A a multi-chain layer-1 protocol for anonymous applications and smart contracts powered by zero-knowledge proofs.
DarkFi, however, "is not a corporate startup. It's a democratic economic experiment, an operating system for society," claims its manifesto. Crypto anarchy, according to DarkFi, "is the tactic of using cryptography to create a space of freedom which cannot be penetrated by power and capital monopolies with coercive force."
DarkFi's manifesto also states that:
"The old model of technology is anti-political because it removes ownership from people and places it into the hands of monopoly. The old model encourages passivity and indifference by design, reducing people to consumers."
Behind the project is a team of anarchist coders, including Amir Taak, an early Bitcoin developer who led the Dark Wallet project before it went dark in 2015, when he vanished from the crypto scene to fight in Syria against the Islamic State of Iraq and the Levant (ISIS), while trying to introduce the local community to Bitcoin.
A group of pseudonymous DarkFi developers spoke with Cointelegraph in an interview about the project testnet and how the crypto industry is evolving among privacy challenges, bad actors, government oversight and politics. This interview has been edited and condensed for clarity.
Cointelegraph (CT): What is DarkFi and what problems does it address in the crypto space?
DarkiFi (DF): DarkFi is a community and a movement trying to create user-empowering systems, enabling an individual to preserve fundamental human rights, like the right to privacy, freedom of speech, and the right to interact with each other without intermediaries. Some of those systems are a Layer-1 blockchain with privacy by default, a peer-to-peer IRC messaging system with encrypted groups and DMs, and even decentralized collaboration tools for organization, task management, etc.
The crypto space has lost its original cypherpunk values, succumbing to state pressure by enforcing sanctions and/or implementing backdoors, so projects can survive. Privacy has become a taboo, which in current conditions often results in violent termination of development, in the name of transparency and prevention of illicit activities. Crypto will split into two - RegFi, unusable and bolted down, and DarkFi, a truly free, decentralized and uncensored paradigm. That's what we are trying to address, fight back - if you will, to retain the power to the minuteman, not serve individuals on a gold plate at states and mega corporations for fiat profit.
CT: What came first when developing DarkFi, the anarchist crypto vision, or the need of base layer solutions for multi-chain applications?
DF: With DarkFi, we want to build anonymous and secure crypto. Like what Monero and Zcash are for money, DarkFi is for apps/smart contracts. We felt there is a large market and need for being able to develop decentralized and anonymous financial applications. This has not been possible until now.
"The crypto space has lost its original cypherpunk values, succumbing to state pressure by enforcing sanctions and/or implementing backdoors, so projects can survive. Privacy has become a taboo."
We believe with privacy by default and maximum anonymity, we will enable people to organize and act in much safer spaces and ecosystems. We are also very inspired by Richard Stallman and the free software movement, which is also why (unlike most other crypto things) DarkFi is fully licensed with the GNU AGPL license, and we follow the free software philosophy.
CT: How can encryption technologies contribute to a balanced environment between personal freedom, government oversight and avoid bad actors at the same time?
DF: Encryption technologies' purpose is to enable users to "hide stuff in plain sight." Oversight, government or otherwise, contradicts this, as it enables 3rd parties to "sniff" on what's inside. Individuals shouldn't give up the control of their freedom, especially to a government, which supposedly should work for the individual, not the other way around. By using these technologies, users are able to protect themselves against bad actors, trying to track them for exploiting them.
CT: What role does Web3 play in society's future privacy and politics?
DF: What is currently being called the "Web3" is just becoming a surveillance tool which is getting abused by adversaries and officials more and more. If this continues, society's "future privacy" will be close to non-existent, and politics will be dictatorships where every user and citizen will have to keep closely in line in order not to be considered unwanted by their oppressors.
CT: How can crypto remain aligned with its core principles as it becomes mainstream and, therefore, more political?
DF: It feels like the entire cypherpunk grassroots movement of the early Bitcoin days has been slowly lost. It's becoming increasingly capitalist and might not be "more political." In fact, with most projects, it seems like they will do all in their power to be less political and more "diverse and inclusive." They do not have bite and simply succumb to the numbing agenda. There are too few projects in the crypto space which are political and caught my eye.
CT: Does crypto have a future without politics?
DF: Crypto isn't a flamboyant tech. Ciphers started as a parallel language between generals, and kings, to deter enemies. They are only visible to senders, and receivers. Ciphers were used in antiquity, Middle Ages, and breaking ciphers drove the development of computers in the last century. They have always been necessary.
In this era, communication, work, and transactions are the basics of any society happening behind screens. At the other end of the channel lays monitoring, and surveillance.
"What is currently being called the "Web3" is just becoming a surveillance tool which is getting abused by adversaries and officials more and more."
The enemy of crypto before computers was in foreign territories. Now the enemy is near, crypto creates a parallel and secure space beyond the state's regulation, sanctions, and policies. Crypto is not against politics, it's used to deter your enemy. The individual's enemies crypto is concerned with are monitoring and surveillance, and crypto principles make no compromise in securing freedom.
CT: What are the next steps in DarkFi's roadmap?
DF: We've just released our initial testnet, so we're having the community try out the UX and find bugs that we've written, so we can iterate and improve. As for the future plans, we're branching out in multiple directions when it comes to the blockchain. We hope we will also be able to educate people on the importance of free software and its philosophy. Just open-source does not cut it. Developers and founders have to quit submitting to Big Tech and use crypto mechanisms to capture value within their projects and stay sovereign.
Ethereum Could Benefit From Stealth Addresses Implementation, Says Vitalik Buterin
Ethereum co-founder Vitalik Buterin published a research post that suggests using stealth addresses to enhance privacy-preserving transfers. Buterin detailed that stealth addresses can be implemented fairly quickly today on Ethereum and would significantly boost user privacy on the blockchain network. Buterin Suggests Stealth Addresses as a Solution to the Privacy Challenges in Ethereum Ecosystem Three […]
Chinese Researchers Claim Success in Breaking RSA Encryption With Quantum Computer, Experts Debate Veracity of Discovery
According to reports circulating on the web, 24 Chinese researchers have reportedly succeeded in breaking RSA encryption using a quantum computer. This would be a significant achievement, as RSA encryption is widely used in current security practices. However, a number of experts, computer scientists, and cryptographers do not believe the researchers have made a significant […]
Web3 Privacy Layer Aztec Raises $100 Million in Series B Funding Round to Produce an Encrypted Version of Ethereum
Aztec, a Web3 privacy layer, has raised $100 million in a Series B funding round led by the Andreessen Horowitz subsidiary a16z crypto. The organization, which already offers privacy-based services for a slew of Ethereum-based apps, will now focus on constructing an encrypted version of Ethereum, allowing individuals and organizations to transact privately. Aztec Raises […]
Aztec Network secures $100 million in Series B funding led by a16z
With the funds, Aztec Network plans to hire more engineers and build a new encrypted blockchain.
The private layer-2 chain Aztec Network announced on Dec. 15 a $100 million Series B funding round led by venture capital firm a16z crypto. Other investors in the round include A Capital, King River, Variant, SV Angel, Hash Key, Fenbushu and AVG.
By partnering with a16z, the company plans to hire new engineers and build a "next-generation encrypted architecture" that allows users to verify that blockchain rules were followed without revealing any underlying information. Encrypted blockchains allow users to transact with privacy and anonymity.
“What we’re building is a revolutionary piece of technology that transforms how we interact with each other online, in which the end user is the customer, rather than the product. End-to-end encrypted blockchains protect individuals, obviating the need for centralized financial systems,” stated Aztec CEO Zac Williamson in the official announcement.
Aztec is reportedly working on a testnet launch within 12 months, with a full mainnet deployment within 24 months.
Related: What's in and what's out for Ethereum’s Shanghai upgrade
According to the company, its cryptography has been tested in production with Aztec Connect, allowing decentralized finance (DeFi) protocols to integrate privacy in hundreds of transactions. Aztec Connect's ecosystem includes Ethereum DeFi protocols such as Aave, Curve, Lido, Element, Set Protocol, Compound and Liquity.
The company is also developing a public-private execution layer for its blockchain, which is designed to integrate encrypted and unencrypted applications seamlessly. Aztec co-founder Joe Andrews noted:
“From PGP and SSL to end to end encrypted messaging, we rely on encryption in our daily lives for businesses and commerce to thrive. With a16z we are standing on the shoulders of giants to bring the encryption we have enjoyed since Netscape to our digital Web3.0 lives. We couldn’t think of a better partner to help us scale Aztec to mainstream.”
Aztec's privacy network was officially launched on the Ethereum blockchain in February 2020. With Zcash-based technology, it provided confidential tokens where the amounts were cryptographically hidden, Cointelegraph reported.
Only 1% of people can handle crypto self-custody right now: Binance CEO
Changpeng Zhao’s comments come as billions of dollars of stablecoins continue to flow out of the Binance exchange.
Binance CEO Changpeng “CZ” Zhao has cautioned the crypto community about self-custody, suggesting that 99% of people choosing to self-custody their crypto will likely lose it one way or another.
CZ has been been a supporter of self-custody for years, referring to its as a “fundamental human right” but has always urged users to “do it right.” He published a “CZ’s Tips” on self-storing crypto in Feb. 2020.
During a recent Binance-run Twitter Spaces on Dec. 14, the Binance CEO continued to urge caution for those using self-custody wallets — suggesting that more often than not, security keys are not stored securely, backed up or properly encrypted, commenting:
“For most people, for 99% of people today, asking them to hold crypto on their own, they will end up losing it.”
CZ reiterated that holding crypto in one’s own wallet is “not risk-free” and postulated that “more people lose money holding their own — lose more crypto when they’re holding on their own than on a centralized exchange.”
And we're live!
— Binance (@binance) December 14, 2022
Tune-in to our Twitter Space where @cz_binance is answering all of your questions. https://t.co/U0hJOWy74P https://t.co/CDDC20cHgt
“Most people are not able to back up their security keys; they will lose the device [...] They will not have the proper encryption for their backup; they will write it on a piece of paper, someone else will see it, and they will steal those funds,” he explained.
The Binance executive also stated that even where self-custody funds are properly managed, “if a person passes away, they don’t have a way to give to their next of kin,” but custodians like Binance can implement a “standard operating procedure” to solve that problem, he said.
The Binance executive concluded that “different solutions have different risk profiles” and that it is up to the user to decide what is best for them.
Despite most of Binance’s operations being “centralized,” CZ iterated that the company remained “neutral” on its preference towards custody and self-custody solutions, with the CEO stating in an earlier Twitter Space discussion on Nov. 14 that he’d happily shutdown the centralized cryptocurrency exchange if users moved to decentralized alternatives.
“If we can have a way to allow people to hold their own assets in their own custody securely and easily, that 99% of the general population can do it, centralized exchanges will not exist or probably don't need to exist, which is great,” CZ said.
Related: Crypto community members discuss bank run on Binance
Binance’s latest Twitter spaces comes amid a turbulent time for the exchange, which has seen significant withdrawals on concerns over its balance sheet and potential incoming litigation.
A Dec. 11 report from The Wall Street Journal suggested several red flags in Binance’s proof-of-reserves audit, while a Dec. 13 Reuters report suggested that the U.S. Department of Justice is nearing the end of a three-year investigation into Binance, which may come with criminal charges.
The last few days has seen a high volume of stablecoin outflows withdrawn from the trading platform, including $2.2 billion outflow of stablecoins Binance USD (BUSD), Tether (USDT) and USD Coin (USDC) over a 24-hour period between Dec. 13-14, according to data from blockchain intelligence platform Glassnode.
Interestingly, Bitfinex’ed — a long time Tether critic —shared a screenshot to its 98,000 Twitter followers on Dec. 14 of Binance’s latest offering 50% APR on staked USDT to its customers, alleging that the exchange may be looking to shore up its allegedly fast dwindling stablecoin reserves.
Binance now offering 50% APR on Tether fraud tokens. Binance appears to be desperately attempting to increase deposits.
— Bitfinex’ed Κασσάνδρα (@Bitfinexed) December 14, 2022
First cloud mining scams now 50% APR rates on Tether fraud tokens!
H/t @Tethertothe1 pic.twitter.com/TZ0oPKxvss
In the latest Twitter Space discussion, CZ attributed the weakened market sentiment — particularly with reference to custodial solutions — to the catastrophic fall of FTX.
Tornado Cash is the latest chapter in the war against encryption
Government disdain for end-to-end encryption is nothing new. The effort to kill Tornado Cash is just the latest chapter in this age-old war.
The sanctions imposed by the United States government on Tornado Cash have reignited a public debate on privacy. For many in the relatively young crypto community, such an intervention by the federal government seems groundbreaking. However, tussles between the private sector and the state on the issue of privacy are far from new and can provide compelling insights on what we might expect next for privacy in the crypto industry.
In the 1990s, Phil Zimmermann released Pretty Good Privacy (PGP), one of the first openly available public-key cryptography applications that featured end-to-end (E2E) encryption. Zimmerman’s creation prompted a criminal investigation that was eventually dropped, resulting in federal court decisions that protect encryption under the U.S. Constitution’s First Amendment. This clash on personal privacy became dubbed the “encryption wars.”
Related: Tornado Cash shows that DeFi can’t escape regulation
The encryption wars rage on today, with officials from the U.S. and other countries urging major tech companies to forgo strong E2E encryption in their products. This would permit law enforcement to access an enormous spectrum of sensitive personal data.
The crypto wars
The next chapter in the encryption wars comes from the Office of Foreign Assets Control (OFAC) sanction of Tornado Cash. The OFAC sanction represents the first outright ban on an application itself, doing away with the line between “providers of anonymizing services” and “anonymizing software providers;” a distinction drawn by another department of the Treasury, the Financial Crimes Enforcement Network (FinCEN).
I sent a letter to Treasury Secretary Yellen regarding the unprecedented sanctioning of Tornado Cash. The growing adoption of decentralized technology will certainly raise new challenges for OFAC. Nonetheless, technology is neutral and the expectation of privacy is normal.⬇️ pic.twitter.com/0aN4a4A6tb
— Tom Emmer (@RepTomEmmer) August 23, 2022
Identifying that software can be detached from an entity controlled by a group or an individual, Congressman Tom Emmer sent a letter to Treasury Secretary Janet Yellen last month requesting clarification on the sanctions. This decision marks one of the most significant clashes on privacy since Snowden exposed the National Security Agency’s mass surveillance practices.
Does history repeat or rhyme?
The sanctions bear hallmarks of when PGP was used as a vehicle to justify an outright ban on encrypting data. Fortunately, the ultimate failure of the ban led to innovation on the web like internet commerce, personal communication and secure logins. Similarly, upholding the sanctions on Tornado Cash creates a dangerous precedent that would bury technological breakthroughs and any associated economic prosperity under a ball of red tape.
Related: Coinbase is fighting back as the SEC closes in on Tornado Cash
To put it another way, criminals have leveraged technological developments throughout history for illicit activity, and banning the technology would be more detrimental than constructive. Should the Tornado Cash sanctions go unchallenged, so many things we take for granted could be jeopardized while inhibiting future advancements and breakthroughs we can’t even imagine today.
Society is well aware of how big tech exploits our personal data en masse under a “surveillance capitalism” paradigm. The reality is that many citizens are willing to consensually forfeit data privacy in exchange for free tech products. However, invasions of privacy mandated by law are another step entirely. For example, newly proposed legislation in the European Union would effectively outlaw E2E encryption.
While the goals behind these policies are usually well-intentioned, legislation forcing the development of “backdoors” for E2E encryption will do more harm than good and inevitably be exploited by malevolent actors.
The future of privacy
E2E encryption infused with Web3 identity standards is the solution, not the problem. Big Tech companies have come to function as centralized identity providers, representing a massive bullseye for cybercriminals of every kind. Advances in decentralized infrastructure and cryptography illustrate that this does not have to be the case. Self-sovereign identity tools that strike a balance between privacy, accountability and regulation are being built on Web3.
Humanity has a habit of resisting technological development. As described by Calestous Juma, early Motorola cell phones were written off as toys for rich people. Now, mobile devices have developed beyond what anyone imagined. Juma posits that people tend to display reluctance to technological advancements when the perceived benefit accrues to a small minority. Similarly, the prospects of E2E encryption are being cast aside because privacy is for criminals.
Related: Tornado Cash sanctions will undermine the US and strengthen crypto
The multichain future of the web will see users managing their identifying data without sacrificing personal privacy or security. In this way, communities could participate in ethical self-regulation rather than relying on digital service providers and authorities. Moral behavior could be easily incentivized, allowing ethical coding and the wisdom of the majority to police ecosystems.
After all, programming is just another form of speech. Some people use their words for good and others for bad. Unsavory or hateful use of the English language should not preclude anyone else from writing. As such, the OFAC sanctions are unconstitutional and should not go unchallenged. Humanity deserves better.
Chad Barraford is the technical lead at THORChain, a noncustodial decentralized liquidity protocol that enables decentralized exchanges (DEXs) and users to transfer their digital assets across blockchains seamlessly.
This article is for general information purposes and is not intended to be and should not be taken as legal or investment advice. The views, thoughts, and opinions expressed here are the author’s alone and do not necessarily reflect or represent the views and opinions of Cointelegraph.
Bitcoin vs. Quantum Computers: US Government Says Post-Quantum World Is Getting Closer, CISA Warns Contemporary Encryption Could Break
According to the U.S. Cybersecurity and Infrastructure Security Agency (CISA), while quantum computers are incapable of breaking public key encryption algorithms, public and private entities need to prepare for future threats against cryptography that is not quantum resistant. Most of today’s digital communications, including cryptocurrencies, leverage public key encryption and CISA believes when “quantum computers […]
Organizations look toward multiparty computation to advance Web3
Multiparty computation is being leveraged to ensure private key security and decentralization within Web3 platforms. But why use it?
Protecting user data and private keys is crucial as Web3 advances. Yet, the number of hacks that have occurred within the Web3 space in 2022 alone has been monumental, proving that additional security measures, along with greater forms of decentralization, are still required.
As this becomes obvious, a number of organizations have started leveraging multiparty computation, or MPC, to ensure privacy and confidentiality for Web3 platforms. MPC is a cryptographic protocol that utilizes an algorithm across multiple parties. Andrew Masanto, co-founder of Nillion – a Web3 startup specializing in decentralized computation – told Cointelegraph that MPC is unique because no individual party can see the other parties’ data, yet the parties are able to jointly compute an output: “It basically allows multiple parties to run computations without sharing any data.”
Masanto added that MPC has a history that runs parallel to blockchain. “Around the same time that blockchain was conceptualized, a sibling technology purpose-built for processing and computation within a trustless environment was being developed, which is multiparty computation,” he said. It has also been noted that the theory behind MPC was conceived in the early 1980s. Yet, given the complexity of this cryptographic method, practical uses of MPC were delayed.
Understanding how MPC will transform Web3
It was only recently that blockchain-based platforms began to implement MPC to ensure data confidentiality without revealing sensitive information. Vinson Lee Leow, chief ecosystem officer at Partisia Blockchain – a Web3 infrastructure platform focused on security – told Cointelegraph that MPC is a perfect ideological match for the blockchain economy.
Unlike public blockchain networks, he noted that MPC solves for confidentiality through a network of nodes that computes directly on encrypted data with zero knowledge about the information. Given this, companies focused on digital asset security began leveraging MPC in 2020 to ensure the security of users’ private keys. Yet, as Web3 develops, more companies are starting to implement MPC to create a greater level of decentralized privacy for various use cases. Masanto added:
“The evolution of Web2 to Web3 focuses on creating methods where people and organizations can collaboratively work on different data sets in a manner that respects privacy and confidentiality while maintaining compliance. Blockchains are not purpose-designed for this because they are typically inherently public, and smart contracts are often run by one node and then confirmed by others. MPC breaks down the computation across the network of nodes, making it a truly decentralized form of computation.”
The promise of MPC has since piqued the interest of Coinbase, which recently announced its Web3 application functionality. Coinbase's new wallet and DApp functionalities are operated with MPC in order to secure the privacy of senders and receivers while ensuring the accuracy of a transaction.
Rishi Dean, director of product management at Coinbase, explained in a blog post that MPC allows users to have a dedicated, secure on-chain wallet. “This is due to the way this wallet is set up, which allows the ‘key’ to be split between you and Coinbase,” he wrote. Dean added that this provides a greater level of security for users, noting that if access to their device was lost, a DApp wallet is still safe since Coinbase can assist in the recovery.
While Coinbase released this feature in early May 2022, the crypto wallet provider ZenGo was equipped with MPC from the company’s inception in 2018. Talking with Cointelegraph, Tal Be’ery, co-founder and chief technology officer of ZenGo said that the wallet applies MPC for disrupted key generation and signing, also known as threshold signature scheme (TSS). He explained that the key is broken up into two “secret shares" split between the user and the company server.
Related: Blockchain and NFTs are changing the publishing industry
According to Be’ery, this specific type of MPC architecture allows a user to sign an on-chain transaction in a completely distributed manner. More importantly, Be’ery added that both secret shares are never joined. “They are created in different places, and used in different places, but are never in the same place,” he explained. As such, he noted that this model remains true to the original MPC promise: “It jointly computes a function (the function in this case is key generation or signing) over their inputs (key shares), while keeping those inputs private (the user’s key share is not revealed to the server and vice versa).”
Be’ery believes that using MPC for signatures is complementary to blockchain technology, since a private key is also required to interact with blockchain networks. However, the TSS method leveraged by ZenGo allows users to distribute their private key, adding an additional layer of security. To put this in perspective, Be’ery explained that private keys for non-custodial wallet solutions are typically burdened by an inherent tension between confidentiality and recoverability:
“Because a private key is the only way to access the blockchain in traditional wallets, it also represents a singular point of failure. From a security perspective, the goal is to keep this private key in as few places as possible to prevent it from getting in others’ hands. But from a recoverability perspective, the goal is to keep the private key as accessible as needed, in case there is a need to recover access.”
However, this tradeoff is not an issue for most MPC-powered systems, as Be’ery noted that this is one of the main challenges MPC solves for crypto wallet providers. Moreover, as Web3 develops, other multiparty computation use cases are coming to fruition. For example, Oasis Labs – a privacy-focused cloud computing platform built on the Oasis network – recently announced a partnership with Meta to use secure multiparty computation to safeguard user information when Instagram surveys asking for personal information are initiated. Vishwanath Raman, head of enterprise solutions at Oasis Labs, told Cointelegraph that MPC creates unlimited possibilities for privately sharing data between parties: “Both parties gain mutually beneficial insights from that data, providing a solution to the growing debate around privacy and information collection.”
Specifically speaking, Raman explained that Oasis Labs designed an MPC protocol together with Meta and academic partners to ensure that sensitive data is split into secret shares. He noted that these are then distributed to university participants that compute fairness measurements, ensuring that secret shares are not used to “learn” sensitive demographic data from individuals. Raman added that homomorphic encryption is used to allow Meta to share their prediction data, while ensuring that no other participants can uncover these predictions to associate them with individuals:
“We can say with confidence that our design and implementation of the secure multiparty computation protocol for fairness measurement is 100% privacy-preserving for all parties.”
MPC will reign supreme as Web3 advances
Unsurprisingly, industry participants predict that MPC will be leveraged more as Web3 advances. Raman believes that this will be the case, yet he pointed out that it will be critical for companies to identify logical combinations of technologies to to solve real-world problems that guarantee data privacy:
“These protocols and the underlying cryptographic building blocks require expertise that is not widely available. This makes it difficult to have large development teams designing and implementing secure multiparty computation-based solutions.”
It’s also important to highlight that MPC solutions are not entirely foolproof. “Everything is hackable,” admitted Be’ery. However, he emphasized that distributing a private key into multiple shares removes the singular attack vector that has been a clear vulnerability for traditional private key wallet providers. “Instead of getting access to a seed phrase or private key, in an MPC-based system, the hacker would need to hack multiple parties, each of which has different types of security mechanisms applied.”
While this may be, Lior Lamesh, CEO and co-founder of GK8 – a digital asset custody solution provider for institutions – told Cointelegraph that MPC is not sufficient by itself to protect institutions against professional hackers. According to Lamesh, hackers simply need to compromise three internet-connected computers to outsmart MPC systems. “This is like hacking three standard hot wallets. Hackers will invest millions when it comes to stealing billions,” he said. Lamesh believes that an MPC enterprise-grade approach requires a true offline cold wallet to manage most digital assets, while an MPC solution can manage small amounts.
Related: Ethereum Merge: How will the PoS transition impact the ETH ecosystem?
Masanto further claimed that traditional MPC solutions may be superior to a solution that “stores sensitive data across many different nodes in the network as a group of unrecognizable, information-theoretic security particles." As the result, hackers would need to find each particle without any identifiable footprint connecting any of the nodes. Masanto added that to make the particle recognizable again, the hacker would need a large proportion of “blinding factors,” which are used to hide the data inside each particle in an information-theoretic security manner.
Those are just some example of how MPC-based solutions will advance in the future. According to Masanto, this will create access to even more MPC use cases and, for example, utilizing the network itself for authentication:
“We consider this a form of ‘super authentication’ – a user will authenticate based on multiple factors (e.g., biometrics, identity, password, etc.) to a network without any of the nodes in the network knowing what they are actually authenticating because the computation of authentication is part of MPC.”
According to Masanto, such a form of authentication will lead to use cases within identity management, healthcare, financial services, government services, defense and law enforcement. “MPC enables systems to be made interoperable while also respecting peoples’ rights and giving them control and visibility over their data and how it is used. This is the future.”