Certified Hardware Requirements Undermine Digital Currency

09/24/2022
by   Geoffrey Goodell, et al.
0

Design approaches based on certified hardware have featured prominently in the recent debate concerning the deployment of large-scale digital currency systems in general and systems to support central bank digital currency (CBDC) in particular. Certified hardware is a cornerstone of the so-called "trusted computing" paradigm, wherein a user carries a device designed to operate in a manner that respects the will of a third party in preference to the will of the user. The justification for such approaches is usually given in terms of the perceived need to facilitate offline payments or to facilitate the recovery of lost assets. In this article, we critically assess the essential problems that digital currency solutions are being proposed to solve, particularly with respect to the future of payments and the future of cash. Next, we examine the characteristics of trusted computing within the context of its application to digital currency systems and its potential impact on the power relationships between the users of devices, the manufacturers of devices, and other powerful actors such as corporations and the state. Finally, we assess the validity of common justifications for certified hardware in the context of alternative designs, limitations, and trade-offs. We conclude that the interests of consumers would be better served by design approaches to digital currency that do not require the use of trusted hardware.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/14/2019

iperfTZ: Understanding Network Bottlenecks for TrustZone-based Trusted Applications

The growing availability of hardware-based trusted execution environment...
research
04/08/2021

CRC: Fully General Model of Confidential Remote Computing

Digital services have been offered through remote systems for decades. T...
research
05/02/2021

SoK: Opportunities for Software-Hardware-Security Codesign for Next Generation Secure Computing

Users are demanding increased data security. As a result, security is ra...
research
10/20/2020

PIE: A Platform-wide TEE

While modern computing architectures rely on specialized hardware such a...
research
09/09/2022

Logic and Reduction Operation based Hardware Trojans in Digital Design

In this paper, we will demonstrate Hardware Trojan Attacks on four diffe...
research
01/20/2020

Towards Digital Twins for the Description of Automotive Software Systems

We present models for automotive software that capture quantitative and ...
research
02/20/2018

Developing a system for securely time-stamping and visualizing the changes made to online news content

Nowadays, the Internet is indispensable when it comes to information dis...

Please sign up or login with your details

Forgot password? Click here to reset