-
(单词翻译:双击或拖选)
Cryptocurrency tech is vulnerable to tampering1, a DARPA analysis finds
Whether prices are up or down, for many investors3 in cryptocurrency, the real appeal is that there's nobody in charge.
As the crowd chanted at the recent Bitcoin 2022 conference in Miami, it's all about "Freedom!" By design, the system is meant to be from interference by banks, companies and governments.
But a new report finds that the decentralized system might not be working as well as many crypto enthusiasts5 assume.
The report was commissioned by the Defense6 Advanced Research Projects Agency, or DARPA, and the work was done by the software security research company Trail of Bits.
Trail of Bits CEO Dan Guido says blockchain — the public ledgers7 that keep track of cryptocurrencies, which are replicated8 on computers around the world — isn't the egalitarian tech its advocates claim.
"It's been taken for granted that the blockchain is immutable9 and decentralized, because the community says so," says Guido.
But in practice, he says, these networks have evolved in ways that concentrate power in the hands of certain people or companies, including the large pools of "miners" whose computers earn virtual currency by maintaining the blockchains.
Guido's team calls these potential situations "unintended centralities" — situations in which someone gains leverage10 over the decentralized system, creating opportunities for tampering with the record of who owns what.
Another example in the report of this kind of concentration is the fact that 60% of Bitcoin traffic is handled by just three internet service providers.
"Let's say somebody with great top-down control of the internet in their country starts to interfere4 with that network," Guido says. By slowing down or stopping legitimate11 blockchain traffic, an attacker could become the "majority" voice in the consensus12 of what's written to a blockchain at that moment.
"They can rewrite history. They can censor13 transactions. They can make it so that you can't spend your Bitcoin," says Guido. "It's definitely something people would want to do if they want to 'grief' the network."
The notion of this kind of attack isn't new, but what the Trail of Bits report does is compile research into different kinds of "unintended centralities" to better understand the technology's overall vulnerability.
Some of the findings are "eyebrow-raising," says Josh Baron14, project manager of the unit at DARPA that commissioned the report.
"For example, the idea that 21 percent of Bitcoin nodes are running an old version of the Bitcoin core client that's known to be vulnerable," Baron says, referring to the basic software running that blockchain. That means all those computer are open to the same kind of hack15 — a big first step for an attacker trying to dominate a blockchain network, sometimes called a "51 percent attack."
"You're already worried about 51 percent, and now I'm telling you that 21 percent are just out there for the taking, as it were. That's that's not great," Baron says.
So far, the risks outlined in the report don't seem to be a major concern for the cryptocurrency business. NPR approached some of the larger companies, such as Coinbase, for a response, but they declined.
Yan Pritzker, co-founder16 of a smaller Bitcoin services company called Swan, told NPR he sees the risks as "theoretical."
"If this kind of attack is possible, why hasn't it happened?" Pritzer asks. "I think the proof is in the pudding a little bit. In real-world conditions, these things don't happen."
Pritzker agrees with the report on this point: There is more centralization in some of the newer forms of cryptocurrency, especially those that rely on a system called "proof of stake," which uses less computing17 power. He's more confident in the resilience of Bitcoin, because its energy-intensive "proof of work" blockchain would take much more computing energy to corrupt18.
Pritzker also points out that this research was commissioned by a government agency.
"They're basically doing endgame research," he says of reports like this. "Their game is, 'how do we get better control of the currency,' and 'how do we build better systems for our control of the currency'."
Christian19 Catalini, founder of the MIT Cryptoeconomics Lab, sees the report as useful, but not too worrying.
"Some of the concerns I think are valid20, but maybe the danger to the broader ecosystem21 is a little overstated," he says, noting that it's important to keep in mind that cryptocurrency systems aren't completely autonomous22. Loose associations of humans — volunteers and "core developers" — are working constantly to maintain and improve them.
"You could imagine some of the issues [in the report] being exploited, eventually — and I think it will happen potentially for some of these," Catalini says. "[But] the community can always coordinate23, respond and, I think over time, will get better at developing the right solutions."
Because cryptocurrencies are decentralized, with no oversight24 by governments or central banks, those solutions will require the attention and consensus of the participants in those networks.
At Trail of Bits, Dan Guido says he thinks cryptocurrencies and blockchain have a promise, but anybody investing in them should consider them to be still in the "prototype" stage.
"Everybody needs to know kind of what they're buying, what they're buying into — what they're going to trust," Guido says. "And there's a lot here that you should not trust. At least, not today."
1 tampering | |
v.窜改( tamper的现在分词 );篡改;(用不正当手段)影响;瞎摆弄 | |
参考例句: |
|
|
2 transcript | |
n.抄本,誊本,副本,肄业证书 | |
参考例句: |
|
|
3 investors | |
n.投资者,出资者( investor的名词复数 ) | |
参考例句: |
|
|
4 interfere | |
v.(in)干涉,干预;(with)妨碍,打扰 | |
参考例句: |
|
|
5 enthusiasts | |
n.热心人,热衷者( enthusiast的名词复数 ) | |
参考例句: |
|
|
6 defense | |
n.防御,保卫;[pl.]防务工事;辩护,答辩 | |
参考例句: |
|
|
7 ledgers | |
n.分类账( ledger的名词复数 ) | |
参考例句: |
|
|
8 replicated | |
复制( replicate的过去式和过去分词 ); 重复; 再造; 再生 | |
参考例句: |
|
|
9 immutable | |
adj.不可改变的,永恒的 | |
参考例句: |
|
|
10 leverage | |
n.力量,影响;杠杆作用,杠杆的力量 | |
参考例句: |
|
|
11 legitimate | |
adj.合法的,合理的,合乎逻辑的;v.使合法 | |
参考例句: |
|
|
12 consensus | |
n.(意见等的)一致,一致同意,共识 | |
参考例句: |
|
|
13 censor | |
n./vt.审查,审查员;删改 | |
参考例句: |
|
|
14 baron | |
n.男爵;(商业界等)巨头,大王 | |
参考例句: |
|
|
15 hack | |
n.劈,砍,出租马车;v.劈,砍,干咳 | |
参考例句: |
|
|
16 Founder | |
n.创始者,缔造者 | |
参考例句: |
|
|
17 computing | |
n.计算 | |
参考例句: |
|
|
18 corrupt | |
v.贿赂,收买;adj.腐败的,贪污的 | |
参考例句: |
|
|
19 Christian | |
adj.基督教徒的;n.基督教徒 | |
参考例句: |
|
|
20 valid | |
adj.有确实根据的;有效的;正当的,合法的 | |
参考例句: |
|
|
21 ecosystem | |
n.生态系统 | |
参考例句: |
|
|
22 autonomous | |
adj.自治的;独立的 | |
参考例句: |
|
|
23 coordinate | |
adj.同等的,协调的;n.同等者;vt.协作,协调 | |
参考例句: |
|
|
24 oversight | |
n.勘漏,失察,疏忽 | |
参考例句: |
|
|