https://twitter.com/antonioregalado/status/631840159466696704 citing http://www.technologyreview.com/news/540151/bitcoins-dark-side-could-get-dar... Partial quote:"Some of the earliest adopters of the digital currency Bitcoin were criminals, who have found it invaluable in online marketplaces for contraband and as payment extorted through lucrative “ransomware” that holds personal data hostage. A new Bitcoin-inspired technology that some investors believe will be much more useful and powerful may be set to unlock a new wave of criminal innovation.That technology is known as smart contracts—small computer programs that can do things like execute financial trades or notarize documents in a legal agreement. Intended to take the place of third-party human administrators such as lawyers, which are required in many deals and agreements, they can verify information and hold or use funds using similar cryptography to that which underpins Bitcoin.Some companies think smart contracts could make financial markets more efficient, or simplify complex transactions such as property deals (see “The Startup Meant to Reinvent What Bitcoin Can Do”). Ari Juels, a cryptographer and professor at the Jacobs Technion-Cornell Institute at Cornell Tech, believes they will also be useful for illegal activity–and, with two collaborators, he has demonstrated how.“In some ways this is the perfect vehicle for criminal acts, because it’s meant to create trust in situations where otherwise it’s difficult to achieve,” says Juels.In a paper to be released today, Juels, fellow Cornell professor Elaine Shi, and University of Maryland researcher Ahmed Kosba present several examples of what they call “criminal contracts.” They wrote them to work on the recently launched smart-contract platform Ethereum.One example is a contract offering a cryptocurrency reward for hacking a particular website. Ethereum’s programming language makes it possible for the contract to control the promised funds. It will release them only to someone who provides proof of having carried out the job, in the form of a cryptographically verifiable string added to the defaced site.Contracts with a similar design could be used to commission many kinds of crime, say the researchers. Most provocatively, they outline a version designed to arrange the assassination of a public figure. A person wishing to claim the bounty would have to send information such as the time and place of the killing in advance. The contract would pay out after verifying that those details had appeared in several trusted news sources, such as news wires. A similar approach could be used for lesser physical crimes, such as high-profile vandalism.“It was a bit of a surprise to me that these types of crimes in the physical world could be enabled by a digital system,” says Juels. He and his coauthors say they are trying to publicize the potential for such activity to get technologists and policy makers thinking about how to make sure the positives of smart contracts outweigh the negatives.“We are optimistic about their beneficial applications, but crime is something that is going to have to be dealt with in an effective way if those benefits are to bear fruit,” says Shi.Nicolas Christin, an assistant professor at Carnegie Mellon University who has studied criminal uses of Bitcoin, agrees there is potential for smart contracts to be embraced by the underground. “It will not be surprising,” he says. “Fringe businesses tend to be the first adopters of new technologies, because they don’t have anything to lose.”[end of partial quote]
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 08/25/2015 01:32 AM, jim bell wrote: [...]
That technology is known as smart contracts—small computer programs that can do things like execute financial trades or notarize documents in a legal agreement. Intended to take the place of third-party human administrators such as lawyers, which are required in many deals and agreements, they can verify information and hold or use funds using similar cryptography to that which underpins Bitcoin.
[...]
One example is a contract offering a cryptocurrency reward for hacking a particular website. Ethereum’s programming language makes it possible for the contract to control the promised funds. It will release them only to someone who provides proof of having carried out the job, in the form of a cryptographically verifiable string added to the defaced site.
[...]
Contracts with a similar design could be used to commission many kinds of crime, say the researchers. Most provocatively, they outline a version designed to arrange the assassination of a public figure. A person wishing to claim the bounty would have to send information such as the time and place of the killing in advance. The contract would pay out after verifying that those details had appeared in several trusted news sources, such as news wires. A similar approach could be used for lesser physical crimes, such as high-profile vandalism.
My first thought: What's to prevent the markets for contract hits on websites and public figures from being monitored by potential victims, and the bounties stolen by 'anonymous' parties, a.k.a. the proposed victims themselves, by simulating the trigger conditions for payouts? Really unpopular people could anonymously crowdfund actions against themselves then collect the loot, a nearly perfect crime. Ultimately, human judgment must have veto power over the automated decision processes - which would void the concept of an impersonal, automated payout process, bringing the reinvented wheel full circle. :o) -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBAgAGBQJV3BDZAAoJEDZ0Gg87KR0LCmUQAJld9tv40ZRzAtqPtm/0Y4iW 5EbXaL/3Jj4EKmzl4vAfd535sLmOmbsWaRuiYZhiqFqVeL6nPPiDbsZfzOnaCZ7u /vGEsOZDSmFQxseTn/ndQeW40gQ0Y9xHE2KVmA07NsGeeUiPzWZ66G5df42wdZqi Pot0VYPHbO69akous6bW24uel0tZGsL/rZ2LxZNG6T60BObeHlj+XaHwQb+Q0zrS vMjtp6FrVtuWzaaRUyjBB4bYpCzGLnaVcH4BLItxudDLAlZmo5cPlBzpcKlV5k59 Bezi9FoA//OzPJOyBbzRlMAWmhjcqaH8VpKEYqtWcR/FbQvvoxecFwB4ajmPesvZ xi1QzTd502IJQ2vbD0kUqlyxU/eKtK7EEgcn64sVWMUjw9hs3/qNcmnT0YMCxGm1 yh4COwYqcFfQVKZsLrBGo7pryDRNTkbn19sT2naBLesa60Y1nq3/V6i5ueoXV32p HOr9QIvSprNyYv7hD2H8nQtyHtW9vLxjXRH6nUASuLUoZIBplLxiWdqNrBGrf8gS Zcdsd7ljXFkeuiZ2YcwtBE36geDtA1JEXCu/9GImJ99GaU+LeibMDsswTlaH7ANl RszCerqhYeC1zpSKFKVksM6YZ+R2+DiknNsos4vgKxzuqTGB5uCia39J5O7mwwk3 8xOByBoOdrEF6EM8h/eP =KVGk -----END PGP SIGNATURE-----
Better, "Bounty Collection as a Service", where sites can contract you to watch the contract space and notify them of bounties worth collecting for themselves. :) On 25 August 2015 07:53:15 GMT+01:00, Steve Kinney <admin@pilobilus.net> wrote:
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
On 08/25/2015 01:32 AM, jim bell wrote:
[...]
That technology is known as smart contracts—small computer programs that can do things like execute financial trades or notarize documents in a legal agreement. Intended to take the place of third-party human administrators such as lawyers, which are required in many deals and agreements, they can verify information and hold or use funds using similar cryptography to that which underpins Bitcoin.
[...]
One example is a contract offering a cryptocurrency reward for hacking a particular website. Ethereum’s programming language makes it possible for the contract to control the promised funds. It will release them only to someone who provides proof of having carried out the job, in the form of a cryptographically verifiable string added to the defaced site.
[...]
Contracts with a similar design could be used to commission many kinds of crime, say the researchers. Most provocatively, they outline a version designed to arrange the assassination of a public figure. A person wishing to claim the bounty would have to send information such as the time and place of the killing in advance. The contract would pay out after verifying that those details had appeared in several trusted news sources, such as news wires. A similar approach could be used for lesser physical crimes, such as high-profile vandalism.
My first thought: What's to prevent the markets for contract hits on websites and public figures from being monitored by potential victims, and the bounties stolen by 'anonymous' parties, a.k.a. the proposed victims themselves, by simulating the trigger conditions for payouts?
Really unpopular people could anonymously crowdfund actions against themselves then collect the loot, a nearly perfect crime.
Ultimately, human judgment must have veto power over the automated decision processes - which would void the concept of an impersonal, automated payout process, bringing the reinvented wheel full circle.
:o)
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIcBAEBAgAGBQJV3BDZAAoJEDZ0Gg87KR0LCmUQAJld9tv40ZRzAtqPtm/0Y4iW 5EbXaL/3Jj4EKmzl4vAfd535sLmOmbsWaRuiYZhiqFqVeL6nPPiDbsZfzOnaCZ7u /vGEsOZDSmFQxseTn/ndQeW40gQ0Y9xHE2KVmA07NsGeeUiPzWZ66G5df42wdZqi Pot0VYPHbO69akous6bW24uel0tZGsL/rZ2LxZNG6T60BObeHlj+XaHwQb+Q0zrS vMjtp6FrVtuWzaaRUyjBB4bYpCzGLnaVcH4BLItxudDLAlZmo5cPlBzpcKlV5k59 Bezi9FoA//OzPJOyBbzRlMAWmhjcqaH8VpKEYqtWcR/FbQvvoxecFwB4ajmPesvZ xi1QzTd502IJQ2vbD0kUqlyxU/eKtK7EEgcn64sVWMUjw9hs3/qNcmnT0YMCxGm1 yh4COwYqcFfQVKZsLrBGo7pryDRNTkbn19sT2naBLesa60Y1nq3/V6i5ueoXV32p HOr9QIvSprNyYv7hD2H8nQtyHtW9vLxjXRH6nUASuLUoZIBplLxiWdqNrBGrf8gS Zcdsd7ljXFkeuiZ2YcwtBE36geDtA1JEXCu/9GImJ99GaU+LeibMDsswTlaH7ANl RszCerqhYeC1zpSKFKVksM6YZ+R2+DiknNsos4vgKxzuqTGB5uCia39J5O7mwwk3 8xOByBoOdrEF6EM8h/eP =KVGk -----END PGP SIGNATURE-----
-- Sent from my Android device with K-9 Mail. Please excuse my brevity.
participants (3)
-
Cathal (Phone)
-
jim bell
-
Steve Kinney