Certified Hardware Requirements Undermine Digital Currency
- URL: http://arxiv.org/abs/2209.12076v2
- Date: Wed, 28 Sep 2022 14:17:05 GMT
- Title: Certified Hardware Requirements Undermine Digital Currency
- Authors: Geoffrey Goodell
- Abstract summary: This article critically assesses the problems that digital currency solutions are being proposed to solve.
We examine the characteristics of trusted computing within the context of its application to digital currency systems.
We conclude that the interests of consumers would be better served by design approaches to digital currency that do not require the use of trusted hardware.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Design approaches based on certified hardware have featured prominently in
the recent debate concerning the deployment of large-scale digital currency
systems in general and systems to support central bank digital currency (CBDC)
in particular. Certified hardware is a cornerstone of the so-called "trusted
computing" paradigm, wherein a user carries a device designed to operate in a
manner that respects the will of a third party in preference to the will of the
user. The justification for such approaches is usually given in terms of the
perceived need to facilitate offline payments or to facilitate the recovery of
lost assets. In this article, we critically assess the essential problems that
digital currency solutions are being proposed to solve, particularly with
respect to the future of payments and the future of cash. Next, we examine the
characteristics of trusted computing within the context of its application to
digital currency systems and its potential impact on the power relationships
between the users of devices, the manufacturers of devices, and other powerful
actors such as corporations and the state. Finally, we assess the validity of
common justifications for certified hardware in the context of alternative
designs, limitations, and trade-offs. We conclude that the interests of
consumers would be better served by design approaches to digital currency that
do not require the use of trusted hardware.
Related papers
- Benchmarking the performance of a self-custody, non-ledger-based, obliviously managed digital payment system [1.2277343096128712]
This paper advances an existing retail CBDC framework developed at University College London.
Our proposed design allows users to retain direct custody of their assets without the need for intermediary service providers.
In parallel, we introduce a streamlined Digital Ledger designed to offer fast, immutable, and decentralized transaction validation.
arXiv Detail & Related papers (2024-04-19T11:57:32Z) - Multi-Tier Computing-Enabled Digital Twin in 6G Networks [50.236861239246835]
In Industry 4.0, industries such as manufacturing, automotive, and healthcare are rapidly adopting DT-based development.
The main challenges to date have been the high demands on communication and computing resources, as well as privacy and security concerns.
To achieve low latency and high security services in the emerging DT, multi-tier computing has been proposed by combining edge/fog computing and cloud computing.
arXiv Detail & Related papers (2023-12-28T13:02:53Z) - Functional Consistency across Retail Central Bank Digital Currency and
Commercial Bank Money [0.0]
We focus on a potential UK retail CBDC, the 'digital pound', and the Bank of England's 'platform model'
We identify the common operational characteristics that are required to achieve functional consistency across all forms of regulated retail digital money.
We conclude that no single design option could provide functional consistency across digital pounds and commercial bank money.
arXiv Detail & Related papers (2023-08-16T13:38:56Z) - The Future of Consumer Edge-AI Computing [58.445652425379855]
Deep Learning has rapidly infiltrated the consumer end, mainly thanks to hardware acceleration across devices.
As we look towards the future, it is evident that isolated hardware will be insufficient.
We introduce a novel paradigm centered around EdgeAI-Hub devices, designed to reorganise and optimise compute resources and data access at the consumer edge.
arXiv Detail & Related papers (2022-10-19T12:41:47Z) - Feature-Level Fusion of Super-App and Telecommunication Alternative Data
Sources for Credit Card Fraud Detection [106.33204064461802]
We review the effectiveness of a feature-level fusion of super-app customer information, mobile phone line data, and traditional credit risk variables for the early detection of identity theft credit card fraud.
We evaluate our approach over approximately 90,000 users from a credit lender's digital platform database.
arXiv Detail & Related papers (2021-11-05T19:10:35Z) - A Scalable Architecture for Electronic Payments [0.0]
We present a scalable architecture for electronic retail payments via central bank digital currency.
We offer a solution to the perceived conflict between robust regulatory oversight and consumer affordances such as privacy and control.
arXiv Detail & Related papers (2021-10-26T16:38:45Z) - Relational Graph Neural Networks for Fraud Detection in a Super-App
environment [53.561797148529664]
We propose a framework of relational graph convolutional networks methods for fraudulent behaviour prevention in the financial services of a Super-App.
We use an interpretability algorithm for graph neural networks to determine the most important relations to the classification task of the users.
Our results show that there is an added value when considering models that take advantage of the alternative data of the Super-App and the interactions found in their high connectivity.
arXiv Detail & Related papers (2021-07-29T00:02:06Z) - Decentralizing Supply Chain Anti-Counterfeiting Systems Using Blockchain
Technology [0.0]
This research proposes the Decentralized NFC-Enabled Anti-Counterfeiting System (dNAS)
dNAS is proposed and developed to facilitate trustworthy data retrieval, verification and management.
It provides a secure and immutable scientific data tracking and management platform on which provenance records are validated.
arXiv Detail & Related papers (2021-02-02T12:17:10Z) - Dos and Don'ts of Machine Learning in Computer Security [74.1816306998445]
Despite great potential, machine learning in security is prone to subtle pitfalls that undermine its performance.
We identify common pitfalls in the design, implementation, and evaluation of learning-based security systems.
We propose actionable recommendations to support researchers in avoiding or mitigating the pitfalls where possible.
arXiv Detail & Related papers (2020-10-19T13:09:31Z) - Regulation conform DLT-operable payment adapter based on trustless -
justified trust combined generalized state channels [77.34726150561087]
Economy of Things (EoT) will be based on software agents running on peer-to-peer trustless networks.
We give an overview of current solutions that differ in their fundamental values and technological possibilities.
We propose to combine the strengths of the crypto based, decentralized trustless elements with established and well regulated means of payment.
arXiv Detail & Related papers (2020-07-03T10:45:55Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.