Blockchain – The Trustless Trust the World is Going After

Technological advancements are becoming more of a routine affair than a breakthrough news these days.

Blockchain – The Trustless Trust the World is Going After

By Iffy Kukkoo

06 May, 2019

Technological advancements are becoming more of a routine affair than a breakthrough news these days. You look around and there is something new – in a phone, television, wearable device, air conditioner, speaker – the list goes on. Once the dust kicked up by new innovations settles down, we get the time to take a deep breath and analyze the effect it has had and the potential it has to solve problems for a long time to come without getting taken over by something new.


Blockchain is one such technology that has attracted a lot of attention from industrialists and technologists alike. Blockchain does, in fact, owe a lot of this attention to cryptocurrencies such as bitcoin that have taken the world by storm in the past few years. Thankfully, the maddening hype around Bitcoin has subsided as investors saw its value rise nearly 20 fold from $900 in Dec 2016 to $19600 in Dec 2017 and then plummet to under $4000 a year later. Billions were made and lost in this frenzied period. Now the world is scratching below the surface and looking at the underlying technology – Blockchain – and the potential it has across industries.


Though we have done posts about blockchain and its potential, in this article we take a step back and scratch below the surface to figure out what is it in Blockchain that can potentially change the fundamentals about currency, banking transactions, accounting and much more.
Cutting the technical jargon and drilling down to the simplest of terms, “trust” is one word that can explain everything about which missing piece of the jigsaw puzzle does Blockchain (and consequently, cryptocurrencies) complete. Trust is that invisible glue binding societies together for centuries. It initiates interactions and facilitates transactions. Trust works at three different levels – individual, institutional and authoritative. When you lend money to a friend in need, you trust him to repay you at a later point in time.
This transaction is facilitated by prevailing trust at individual level. At a larger scale, when you place an online order and pay in advance, you trust it to deliver your order in time and in brand new condition, even if there is no face in front of you to trust. At a more macro level, when we have a currency note and tender it in exchange of goods and services, the merchant happily accepts it. Both of us have full trust in the country’s central banking system.


Trusting a “central system” is of utmost importance here. Individuals and organizations place their trust on a single entity, a governing body and carry on with their day-to-day businesses. High trust societies have often found to be the happiest. Businesses build over a culture of trust and companionship rather than strict regulations have been found to be more successful. Centralized trust is still the driving force behind banking systems and economies around the world.
The United States took it a notch higher in 1971 that its economy was functioning in a high trust environment by de-linking its dollar from the bullion system – the gold standard still prevalent in major economies. This demonstrated that a dollar holder had full confidence in federal banking system, even if there was no corresponding asset to back the value of a dollar.
One major problem with centralized trust is that it lends itself to risks arising out of information asymmetry. Hackers have a great incentive to break into that one database, as they know they are going to find a goldmine of information if they succeed.
The system is often governed by a single entity – a single authority – which provides huge incentive for corruption. Recent history of the modern, technology driven world is full of instances where customer data gets leaked – intentionally or otherwise – by the top authorities/individuals entrusted with the task of protecting it.
While blockchain attempts to solve most of these concerns (we’ll see later how), a number of governments and social groups around the world have resisted its adoption. The major challenge is getting them to make peace with the fact that rather than viewing blockchain as a technology that presents alternative currency, they should look at it as redefining trust.
That the mechanism finds its way in disrupting the way currencies work is just a byproduct. After all, the world has learnt to trust electronically generated bank statements and payment receipts that substitute cash transactions and there is no reason to believe why cryptocurrency cannot gain popularity among the same stakeholders. DigiCash: Novel Innovation Destroyed by Centralized Trust

DigiCash: Novel Innovation Destroyed by Centralized Trust

Even though cryptocurrencies are starting to gain momentum in recent years, the idea of a substitute currency was first introduced by David Chaum decades ago, in 1983. Six years later, he founded DigiCash, which had a central controlling authority for issue, control and regulation. It combined elements of trust and security. It implemented security through blind signatures that wrapped it in a layer of anonymity to add to security. It was just a matter of time when DigiCash made huge waves in the financial sector and a major bank like ING offered a deal to Chaum within years.
Negotiations went on for months and but Chaum walked out at the final stage. That did not deter other industry giants from pursuing their interest and none other than Bill Gates tabled a $100 million offer for integrating DigiCash with Windows 95 but to everybody’s dismay, Chaum did not find it interesting enough either. The news was not received well within the company and an internal rebellion caused its downfall in the year 1999. Failed talks apart, the centralized nature of DigiCash’s structure posed a major challenge to its operations.

Why Did DigiCash Fail?

DigiCash started with a lot of promise but fell prey to the same mistakes that prevailed in existing systems for decades. Any database system is characterized by a central authority that has full control over it. They can decide what is available to public, who can access (or not access) the database, what rights can the users have, what gets stored in it and what gets deleted. This can have serious ramifications on two fronts:
First, such a strictly controlled master database with an entire system dependent upon it is a single point of failure. Wells Fargo learnt it the hard way recently, when their Shoreview datacenter reported smoke and customers could not complete their ATM/Debit Card/Credit Card transactions for many days after it. The bank’s Interactive Voice Response (IVR) systems too got severely affected which adversely affected customer calls.
Second major risk is that a server hosting a central database is a sitting target for hacker attacks. There is a huge prize for cracking its code, serving as a major motivation.

Double Spend Problem with Digital Currencies

Digitized currencies bring a number of benefits with them but they are not without flaws. Double spending problem is one of the most common problems of digital currencies. A digital token is relatively easy to reproduce, unlike physical currency like notes and coins. The legitimacy of physical currency can be verified instantly. Holder of a digital currency can easily retain the original with himself and transact its digital copy. As there is no central agency to verify that the currency is spent only once, adoption of digital currency hinged upon the participants’ ability to verify its authenticity.

Block Chain – Solution to Double Spend Problem

Satoshi Nakamoto (a pseudonym) presented this paper in 2008 to a mailing list where he introduced his own crypto currency (Bitcoin) and detailed upon the approach to tackle double spend problem. He proposed that all bitcoin transactions be recorded in a shared transaction log, a public ledger called “block chain”. It is a list of transactions that keeps building up over time and any change in ownership can be verified against its history to eliminate fraudulent transactions.
As ownership keeps changing, the log builds up and that is why verification takes a lot of time and considerable computing power. This is what makes blockchain based transactions inherently irreversible. Hackers have tried mechanisms such as out-computing to fool the blockchain system but have had very limited success. Most bitcoin thefts have resulted from users’ carelessness rather than from loopholes in the system.
The greatest threat to blockchain security is a 51% attack, where a user controls a majority of network’s computing power. This can enable him to reverse the ledger and transfer coins to his own wallet multiple times, completely eliminating the traces of original transactions.

Our privacy promise to you
dee.ie Do you need some help?

What Keeps Blockchain Secure – Cryptography and Hash Function

Though detailed cryptography is out of the scope of a couple of articles, a basic understanding goes a long way in understanding security mechanism of blockchain. Cryptography involves sending encoded messages so that even if the message ends up with unintended recipients, it cannot be read by them. The intended recipient possesses a decryption code which is used to decode and read the message.
Public Key Infrastructure (PKI) is a popular form of cryptography, where a set of complementary keys (private key and public key) is generated before sending a message. A message is encrypted with the receiver’s public key before sending. Receiver uses his private key to decrypt the message and read it, preventing its misuse at the hands of an interceptor. This approach works better than the centralized passwords, which give absolute power once the password ends up in wrong hands.

Hash Function

Hash function lies at the core of blockchain trust. It is a unique function that has the capability to take data of any size and turns it into a fixed width output of hexadecimal characters. What sets it apart from other crypto mechanisms is the fact that whether the input of a hash function is a single character or an entire text book, width of output remains same. It is also unidirectional, which means you cannot trace the input string if you have the output. Therefore, the block identifiers generated by hash functions are unique and immutable.
Secure Hash Algorithm (SHA – 256) is capable of generating an astronomical number of combinations. These identifiers are then utilized to label blocks of data, addresses and transactions that are used to modify the public transaction ledgers, which also explains the relatively long time it takes to authenticate and modify it.

Mining and Consensus

A blockchain ledgers is a very dynamic record and it needs to be kept up to date in real time, meaning a large number of computing units (and associated electricity supply) need to be available and work 24 hours a day, 7 days a week. The process of validating and verifying transaction ledgers is known as mining. The huge computing power required for it is shared by the entire network. The nodes that help in solving such huge problems are identified and rewarded. Solving more complex problems requires higher computing power and fetches higher rewards. This also serves as a motivation for network participants to bring in more processing power to the network.


As a blockchain database is distributed rather than centralized, a copy of it is stored over all participating nodes (computers). Its non-hierarchical, peer to peer architecture ensures all the nodes are of equal importance and there is no central authority to control the database. When a bitcoin transaction is made, it has to be authorized by the entire network before being allowed. Once all the nodes approve a transaction, it is then protected by hash signatures and miners add the block to the database.


In conclusion, we would like to stress that the immutability of blockchain transactions can be a boon and a bane. Elaborate precautions and authentication measures are in place to validate a transaction but once it enters the system, it cannot be reversed at any cost. Imagine a scenario where you want to send $100 to a merchant but instead entered $1000 in haste. This transaction cannot be reversed at any cost. It will entirely depend on the recipient’s good faith to correct the mistake, otherwise it stays in the system forever!

Posted By: Iffy Kukkoo
Resident Editor-In-Chief

Iffy is our exclusive resident technology newshound editor, relentlessly exploring the beauties of the world from a 4th dimensional viewpoint. When not crafting, editing or publishing our IT content, she spends most of her time helping people understand life and its basic principles. You know, the little things around you, that you've failed to grasp each day.

Dee.ie IT blog has updates on IT Consultancy, IT Contractors and Software Development related posts, on how your business can be managed effectively using technology.

Feel free to read more and or reach out to share your thoughts, feelings and input on our articles, our team would love to hear from you!

Our privacy promise to you
Have a Question or Need an Answer? Ask our Live Chat and we will include it in our FAQ’s to make things easier for others

Our IT Blog

Latest Blog Post
blog-post

How to improve your businesses Software Maintenance?

Latest Blog Post
blog-post

What is the Difference Between a CTO & IT Consultant?

All Posts