Perils of current DAO governance
- URL: http://arxiv.org/abs/2406.08605v1
- Date: Wed, 12 Jun 2024 19:21:23 GMT
- Title: Perils of current DAO governance
- Authors: Aida Manzano Kharman, Ben Smyth,
- Abstract summary: Vote buying, vote selling and coercion are easy.
The wealthy rule, decentralisation is a myth. Hostile take-overs are incentivised.
Ballot secrecy is non-existent or short lived, despite being a human right.
- Score: 0.21485350418225244
- License: http://creativecommons.org/licenses/by-nc-sa/4.0/
- Abstract: DAO Governance is currently broken. We survey the state of the art and find worrying conclusions. Vote buying, vote selling and coercion are easy. The wealthy rule, decentralisation is a myth. Hostile take-overs are incentivised. Ballot secrecy is non-existent or short lived, despite being a human right. Verifiablity is achieved at the expense of privacy. These privacy concerns are highlighted with case study analyses of Vocdoni's governance protocol. This work presents two contributions: firstly a review of current DAO governance protocols, and secondly, an illustration of their vulnerabilities, showcasing the privacy and security threats these entail.
Related papers
- Security Is Not Enough: Privacy in Encryption Regulation and Lawful-Surveillance Protocols [0.0]
This article argues that security is not enough to fully capture what is at stake in government exceptional access to encrypted data.<n>A richer understanding is needed both to assess policy and to guide research on lawful-surveillance protocols.
arXiv Detail & Related papers (2026-02-28T23:41:22Z) - Your Privacy Depends on Others: Collusion Vulnerabilities in Individual Differential Privacy [50.66105844449181]
Individual Differential Privacy (iDP) promises users control over their privacy, but this promise can be broken in practice.<n>We reveal a previously overlooked vulnerability in sampling-based iDP mechanisms.<n>We propose $(varepsilon_i,_i,overline)$-iDP a privacy contract that uses $$-divergences to provide users with a hard upper bound on their excess vulnerability.
arXiv Detail & Related papers (2026-01-19T10:26:12Z) - Bitcoin, a DAO? [2.0311747819090398]
This paper investigates whether Bitcoin can be regarded as a decentralized autonomous organization (DAO)
It explores what insights it may offer for the broader ecosystem, and how Bitcoin governance can be improved.
arXiv Detail & Related papers (2025-04-29T15:01:03Z) - Registered Attribute-Based Encryption with Reliable Outsourced Decryption Based on Blockchain [12.205762282360482]
Attribute-based encryption (ABE) is a promising solution that enables fine-grained access control in data sharing.<n>We propose the first auditable RABE scheme with reliable outsourced decryption (ORABE) based on blockchain.
arXiv Detail & Related papers (2024-12-12T05:38:50Z) - A Survey of Privacy-Preserving Model Explanations: Privacy Risks, Attacks, and Countermeasures [50.987594546912725]
Despite a growing corpus of research in AI privacy and explainability, there is little attention on privacy-preserving model explanations.
This article presents the first thorough survey about privacy attacks on model explanations and their countermeasures.
arXiv Detail & Related papers (2024-03-31T12:44:48Z) - Auditing Private Prediction [45.23153167486169]
We study the privacy leakage of four private prediction algorithms: PATE, CaPC, PromptPATE and Private-kNN.
Our experiments show that (i) the privacy analysis of private prediction can be improved, (ii) algorithms which are easier to poison lead to much higher privacyleakage, and (iii) the privacy leakage is significantly lower for adversaries without query control than thosewith full control.
arXiv Detail & Related papers (2024-02-14T18:59:27Z) - The Boomerang protocol: A Decentralised Privacy-Preserving Verifiable Incentive Protocol [5.384175614198884]
We propose the BOOMERANG protocol for privacy-preserving incentive systems.
It uses cryptographic black box accumulators to store user interactions privately.
It also employs zero-knowledge proofs to transparently compute rewards for users.
arXiv Detail & Related papers (2023-12-06T09:37:45Z) - DAO Decentralization: Voting-Bloc Entropy, Bribery, and Dark DAOs [6.92620603424171]
Decentralized Autonomous Organizations (DAOs) use smart contracts to foster communities working toward common goals.
We propose a new metric called Voting-Bloc Entropy (VBE) that formalizes a broad notion of decentralization in voting on proposals.
We present the first practical realization of a Dark Sapphire, a proposed mechanism for privacy-preserving corruption of identity systems.
arXiv Detail & Related papers (2023-11-06T21:13:06Z) - TeD-SPAD: Temporal Distinctiveness for Self-supervised
Privacy-preservation for video Anomaly Detection [59.04634695294402]
Video anomaly detection (VAD) without human monitoring is a complex computer vision task.
Privacy leakage in VAD allows models to pick up and amplify unnecessary biases related to people's personal information.
We propose TeD-SPAD, a privacy-aware video anomaly detection framework that destroys visual private information in a self-supervised manner.
arXiv Detail & Related papers (2023-08-21T22:42:55Z) - Unpacking How Decentralized Autonomous Organizations (DAOs) Work in
Practice [54.47385318258732]
Decentralized Autonomous Organizations (DAOs) have emerged as a novel way to coordinate a group of entities towards a shared vision.
In just a few years, over 4,000 DAOs have been launched in various domains, such as investment, education, health, and research.
Despite such rapid growth and diversity, it is unclear how theses actually work in practice and to what extent they are effective in achieving their goals.
arXiv Detail & Related papers (2023-04-17T01:30:03Z) - Having your Privacy Cake and Eating it Too: Platform-supported Auditing
of Social Media Algorithms for Public Interest [70.02478301291264]
Social media platforms curate access to information and opportunities, and so play a critical role in shaping public discourse.
Prior studies have used black-box methods to show that these algorithms can lead to biased or discriminatory outcomes.
We propose a new method for platform-supported auditing that can meet the goals of the proposed legislation.
arXiv Detail & Related papers (2022-07-18T17:32:35Z) - Second layer data governance for permissioned blockchains: the privacy
management challenge [58.720142291102135]
In pandemic situations, such as the COVID-19 and Ebola outbreak, the action related to sharing health data is crucial to avoid the massive infection and decrease the number of deaths.
In this sense, permissioned blockchain technology emerges to empower users to get their rights providing data ownership, transparency, and security through an immutable, unified, and distributed database ruled by smart contracts.
arXiv Detail & Related papers (2020-10-22T13:19:38Z) - Online publication of court records: circumventing the
privacy-transparency trade-off [0.0]
We argue that current practices are insufficient for coping with massive access to legal data.
We propose a straw man multimodal architecture paving the way to a full-fledged privacy-preserving legal data publishing system.
arXiv Detail & Related papers (2020-07-03T13:58:01Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.