Pause The Blockchain Legal Revolution - Kelvin Low and Aliza Mik (2019)
Pause The Blockchain Legal Revolution - Kelvin Low and Aliza Mik (2019)
When bitcoin was released by the mysterious Satoshi Nakamoto in 2008, few could have predicted that it would
attract as much attention as it has today. It has spawned a veritable host of other cryptocurrencies, including ether
on the upstart Ethereum network, which boasts smart contract functionality. The underlying blockchain
technology has also attracted attention, with some within the blockchain community suggesting that it can solve
such diverse problems as secured digital voting to tracking food provenance. In the legal context, blockchains
have been envisaged as capable of revolutionizing registries for assets ranging from land to intellectual property,
modernising clearing and settlement, and even fundamentally transforming the contracting process. This paper
critically evaluates the popular claims surrounding the potential of blockchain technologies to disrupt the legal
system by separating hype from fact.
I. INTRODUCTION
In 2008, the world was introduced to the concept of a blockchain when Satoshi Nakamoto1
published his white paper on bitcoin.2 Born of the Great Recession,3 bitcoin and its countless
progeny of altcoins 4 would capture the public’s imagination through the inflation of “the
mother and father of all bubbles”.5 An early crash6 in the price of this volatile7 asset thrust the
blockchain into the spotlight, prompting many to consider whether the blockchain might prove
more important than bitcoin itself.8 Interest in blockchains was drawn initially from finance
and technology.9 Hailed as a “trust machine” that “could transform how the economy works”,10
blockchains were “the future of everything”.11
II. TECHNICALITIES
A. Definitional Conundrums
12
K. Yeung, “Regulation by Blockchain: the Emerging Battle for Supremacy between the Code of Law and Code
as Law” (2019) 82 M.L.R. 207 at 208.
13
Above n. 11 at 208.
14
Below text accompanying n. 24-38.
15
Above n. 11 at 208.
16
See, e.g., P. Paech, “The Governance of Blockchain Financial Networks” (2017) 80 M.L.R 1073.
17
Cf. A. Pope, An Essay on Criticism (1709): “A little learning is a dangerous thing”. The naïveté about economics
among many crypto-enthusiasts have led some to christen bitcoins as “Dunning-Kruggerands”: D. Gerard, Attack
of the 50 Foot Blockchain: Bitcoin, Blockchain, Ethereum and Smart Contracts (London, Createspace, 2017) at
42. The Dunning-Kruger effect is the name given to the cognitive bias in which incompetence leads to inflated
self-assessments, after the authors of the seminal paper: J. Kruger and D. Dunning, “Unskilled and Unaware of It:
How Difficulties in Recognizing One’s Own Incompetence Lead to Inflated Self-Assessments” (1999) 77 J. Pers.
Soc. Pyschol. 1121.
18
See generally: A. Walch, “The Path of the Blockchain Lexicon (and the Law)” (2016) 36 Rev. Banking & Fin.
L. 713.
19
InterPARES Trust Terminology Project: Key Blockchain Terms and Definitions (2018)
https://interparestrust.org/terminology/term/blockchain
20
A hash algorithm takes an arbitrary-length data input and produces a fixed-length deterministic result. For any
specific input, the resulting hash will always be the same and can be easily calculated and verified by anyone
Permissionless blockchains are open and anonymous. They allow anyone to join the
network without disclosing their identity and agreeing to any system rules or terms of use. It is
only necessary to run the requisite software. The only rules that the participants must follow
are those encoded in the algorithm. In principle, all participating nodes are equal and enjoy the
same rights to access, use and edit the given blockchain.26 Permissionless blockchains typically
involve a native crypto-asset, such as bitcoin or ether, which serves as an economic incentive
to produce blocks and hence maintain the integrity of the entire system.27 They also rely on a
consensus algorithm that leverages game theory 28 to compel strangers to cooperate in the
implementing the same hash algorithm. It is computationally infeasible to find two different inputs that produce
the same fingerprint (a collision) or to select an input in such a way as to produce a desired fingerprint, other than
trying random inputs. See: A. M. Antonopoulos, Mastering Bitcoin, 2nd ed (Sevastopol: O’Reilly, 2017), at p. 228
21
Some blockchains have been designed for specific purposes or industries, others are generic in nature. For
example, the permissioned ledger Ripple was developed to support the banking and finance industry, whereas
Hyperledger Fabric supports the collaborative development of blockchain-based distributed ledgers for a wider
range of industries and transaction types.
22
Distributed ledgers are a broader category of dispersed, synchronised and cryptographically secured databases:
R. Maull et al., “Distributed ledger technology: Applications and Implications” (2017) 26 Strategic Change 481,
at p. 483.
23
Insofar as they do not do so, they are not immutable to the same extent that blockchains are, see text
accompanying nn. 56-69. Corda, a distributed ledger, developed by the R3 consortium, famously “abandoned”
the concept of blocks; see generally: R. Gendal Brown, J. Carlyle, I. Grigg, M. Hearn, Corda: An Introduction
(2016), available at docs.corda.net/_static/corda-introductory-whitepaper.pdf (accessed 6 December 2018).
24
There are blockchains that do not fall into either categorization as they constitute a hybrid model. Sometimes,
the term “permissioned” is used interchangeably with “private” and the term “permissionless” with “public” but
these terms are not used consistently. See also R. Lai, D. K. C. Lee, Handbook of Blockchain, Digital Finance,
and Inclusion, Volume 2 (London: Academic Press, 2018) at p. 147.
25
Above, n. 20, at p. 50. End users do not need to, and many do not, operate full nodes: see
https://bitcoin.org/en/full-node (accessed 6 December 2018).
26
X. Xu et al., “A Taxonomy of Blockchain-Based Systems for Architecture Design” 2017 IEEE International
Conference on Software Architecture (ICSA), Gothenburg 2017, pp. 243-252.
27
Miners are incentivized to add new blocks by obtaining bitcoins (when their block is added to the blockchain)
and transaction fees (when they include a transaction in their block), indirectly, this incentive mechanism ensures
the integrity and immutability of the blockchain. See above, n. 20, at p. 26.
28
Game theory is “the study of mathematical models of conflict and cooperation between intelligent rational
decision-makers.”: R.B. Myerson, Game Theory: Analysis of Conflict (Cambridge: Harvard University Press,
The technical attributes described above guarantee the supposed “trustlessness” of the
entire system, which differs from traditional ledgers where the trustworthiness of the keeper of
the ledger is indispensable. The reasoning is that one can trust the code alone, without having
to trust any of the nodes running the network.34 Trust in the code supposedly engenders trust
in non-trusted counterparties or what enthusiasts call “trustless trust”. Reliance on human
institutions, such as banks or courts, is replaced with reliance on technology. It can be difficult
for agnostics to understand how the “trustless” character of blockchains eliminates the need to
trust humans since it obviously overlooks the fact that there is no immaculate conception of
blockchain code.35 It must have been coded by a human or, more likely, a group of humans.
Although the process of appending individual blocks is decentralised, the process of coding the
blockchain is highly centralised. For example, data from May 2015 reveals that seven
individuals alone were responsible for 68% of the code for the bitcoin blockchain, earning them
the epithet of “core developers”.36 Many altcoin blockchains are coded by rank amateurs, and
1991) at p. 1. Pioneered by John von Neumann (J. von Neumann and O. Morgenstern, Theory of Games and
Economic Behavior (Princeton: Princeton University Press, 1944) and popularised by Ron Howard (Dir.), A
Beautiful Mind (Imagine Entertainment et al., 2001), a biographical film about John Nash, a Nobel laureate who
developed the Nash equilibrium, there are well-known limitations to the sort of traditional game theory that many
blockchain algorithms are built upon: see, e.g., A. M. Colman, “Cooperation, Psychological Game Theory, and
Limitations of Rationality in Social Interaction” (2003) 26 B.B.S. 139.
29
See generally: V. Buterin, “On Public and Private Blockchains”, Blog Post (6 August 2015) at
https://blog.ethereum.org/2015/08/07/on-public-and-private-blockchains/ (accessed 6 December 2018).
30
D. Andolfatto (31 March 2014), “Bitcoin and Beyond: The Possibilities and Pitfalls of Virtual Currencies”,
Dialogue with the Fed, at pp. 16-17.
31
K.F.K. Low and E.G.S. Teo, “Bitcoins and Other Cryptocurrencies as Property?” (2017) 9 L.I.T. 235, at p. 238.
32
A. de Vries, “Bitcoin’s Growing Energy Problem” (2018) 2 Joule 801. For the latest information on Bitcoin
energy consumption, see https://digiconomist.net/bitcoin-energy-consumption (accessed 1 March 2019). For
information on Ethereum energy consumption, see https://digiconomist.net/ethereum-energy-consumption
(accessed 1 March 2019). This high monitoring cost is unsurprising since “proof-of-work” is designed assuming
the absence of trust: cf. H.J. Chang, 23 Things They Don’t Tell You About Capitalism (London: Allen Lane, 2010),
at pp. 41-50. If Chang’s hypothesis that “[a]ssume the worst about people and you get the worst” is correct, that
may also explain the widespread prevalence of fraud and scams within the crypto-community: see, e.g., S. Shifflett
and C. Jones, “A Flood of Questionable Cryptocurrency Offerings”, The Wall Street Journal (26 December 2018,
updated 9 January 2019).
33
Above, n. 20, at p. 162. But see text accompanying nn. 57-69.
34
K. Werbach and N. Cornell, “Contracts Ex Machina” (2017) 67 Duke L. J. 313, at p. 333.
35
The religious metaphor is frequently invoked to describe faith in the blockchain and bitcoin even has its own
Bitcoin Jesus, one Roger Ver. See N. Paumgarten, “The Prophets of Cryptocurrency Survey the Bust and Boom”,
The New Yorker (22 October 2018); J. Kelly, “The Unholiest of Holy Wars: ‘Satoshi’ vs ‘Bitcoin Jesus’”, FT
Alphaville (10 November 2018).
36
See, e.g., in relation to the bitcoin blockchain, G. Vidan and V. Lehdonvirta, “Mine the gap: Bitcoin and the
maintenance of trustlessness” (2018) New Media & Soc. 42, especially pp. 49-51.
The technical literature often states that blockchains (or, to be more precise, their underlying
consensus algorithms) “validate” transactions or other events. This has confused many into
thinking that the technical meaning of the term overlaps with the legal meaning – establishing
compliance with the law, declaring something legally valid, or otherwise demonstrating the
truth of a statement.40 It is necessary, however, to understand who validates what and against
what criteria.
37
See CVE-2018-17144 Full Disclosure at https://bitcoincore.org/en/2018/09/20/notice/ (accessed 6 December
2018).
38
Fixed at 21 million bitcoins. Note that there is no cap for ether.
39
D. Yermack, “Corporate Governance and Blockchains” (2017) 21 R.F. 7 at 16.
40
See: Oxford English Dictionary definition of “validate”; above, n. 18, at pp. 1080-1082, referring to “[a] fail-
proof system, the displacement of trust and the redefinition of truth”.
41
Antonopoulos describes decentralized consensus as an emergent artifact of the asynchronous interaction of
thousands of independent nodes, all following simple rules, see: above, n. 20 at p. 217.
42
N. Popper, “How China Took Center Stage in Bitcoin’s Civil War”, The New York Times (29 June 2016). Also
see H. Murphy, “‘Bitcoin whales’ control third of market with $37.5bn holdings”, Financial Times (9 June 2018).
Obviously, the validation process cannot confirm off-chain events, i.e. events occurring
in the real world. No consensus algorithm can establish or verify whether, for example, the
transfer of bitcoin was actually due, whether it resulted from a legally enforceable contract, or,
perhaps most significantly, whether the private key initiating the transfer of bitcoin was used
by its rightful holder. As the English Law Commission recently explained, “[t]he question of
whether an electronic signature is secure or reliable is a different matter from whether that
signature is valid in law.”50 In technical terms, the “execution environment of a blockchain is
self-contained as it can only access information in the blockchain. Information about external
systems is not directly accessible.”51 Blockchains can only “see and react” to on-chain events
43
V. Buterin, “Governance, Part 2: Plutocracy Is Still Bad”, Blog Post (28 March 2018) at
https://vitalik.ca/general/2018/03/28/plutocracy.html (accessed 6 December 2018).
44
J. Hill, “The Role of the Donee's Consent in the Law of Gift” (2001) 117 L.Q.R. 127.
45
Above, n. 20 at pp.18, 19.
46
J. Gray, “The Transaction Concept: Virtues and Limitations,” in M. Stonebraker (ed), Readings in Database
Systems (San Francisco: Morgan Kaufman Publishing, 1988) at pp.140, 141; J. D. Ullman, Principles of Database
and Knowledge Base Systems, vol 1; (Rockwell: Computer Science Press, 1988) at pp. 300, 301, 337.
47
Above, n. 20 at pp. 24, 25.
48
For a detailed description of validation criteria see: above n. 20, p. 218, 219.
49
Above, n. 20 at p. 238.
50
Law Commission Consultation Paper No 237, Electronic Execution of Documents (21 August 2018) at 20.
51
Above, n. 26 at 6.
Blockchains are often referred to as “immutable.” The term can relate to three discrete
situations: to the transactions or “assets” recorded in the blockchain, to other information
recorded in the blockchain, or to the code of blockchain-based applications. In the first instance,
it is stated that once a transaction is accepted into a block and once a block is appended to the
ledger, it cannot be changed or reversed. This feature is commonly associated with guaranteed
performance and transaction finality. The second situation concerns the possibility to inscribe
“other information” into the blockchain, such as any arbitrary content that was not envisaged
to be recorded by the bitcoin protocol. Examples of such content range from the original bitcoin
white paper, political commentary, to more commercially-oriented content such as information
about the ownership of real world assets, and even illicit content such as child pornography.56
Once such content is embedded in the blockchain, it cannot be removed or changed. As a result,
blockchains are often regarded a perfect record-keeping technology.57 After all, everything that
is inscribed in them stays there forever and cannot be changed. The inclusion of such
information in the blockchain is the result of a “hack” of bitcoin addresses.58 However, it is
clear that the veracity of said information cannot be validated by the consensus algorithm.59
The third situation in which the concept of immutability becomes relevant concerns the fact
that (in most permissionless blockchains) it is impossible to change the code of applications
running “on” it.60
“Immutability”, it turns out, is a surprisingly mutable concept. First, not all blockchains
are immutable.61 Permissioned blockchains may give certain nodes the right to retrospectively
edit the contents of a block, reverse transactions or, as part of formalised system upgrades,
amend the underlying code. To the extent that such permission exists, it detracts from one of
the main attractions of a distributed system: the absence of a single point of failure. It is
unnecessary to hack the network if you only need to hack a single node with the permission to
52
Illicit transactions on the Silk Road were an early use case for bitcoins that generated interest in the crypto-
asset.
53
https://legalfling.io/ (accessed 6 December 2018).
54
Maya Salam, “Consent in the Digital Age: Can Apps Solve a Very Human Problem?”, The New York Times (2
March 2018).
55
https://legalfling.io/#faq in response to the question “Does this proof [sic] consent beyond any doubt?”
(accessed 6 December 2018).
56
R. Matzutt et al, “A Quantitative Analysis of the Impact of Arbitrary Blockchain Content on Bitcoin,” in:
Financial Cryptography and Data Security 2018. Twenty-Second International Conference , Curaçao ,
Netherlands (Aachen: RWTH Publications, 2018). See also Samuel Gibbs, “Child abuse imagery found within
bitcoin's blockchain”, The Guardian (20 March 2018).
57
Above n. 18 at pp. 735, 736.
58
The hack entails embedding additional content in bitcoin addresses or creating “fake” ASCII addresses.
59
See text accompanying nn. 67-69.
60
See text accompanying n. 219.
61
See also n. 22 for distributed ledgers, which are not blockchains.
62
See text accompanying nn. 190-195. More generally, see Low and Teo, above n. 31, at pp. 259-264.
63
See text accompanying nn. 137-139.
64
M. Vukolić, “The Quest for Scalable Blockchain Fabric: Proof-of Work vs. BFT Replication,” in: J. Camenisch
and D. Kesdoğan (eds) Open Problems in Network Security (2016) Lecture Notes in Computer Science, vol
9591 (New York: Springer, 2016).
65
For bitcoins. The advice is to wait for 20-25 confirmations for ethereum. However, because the average time to
mine a block for ethereum is only 15 seconds compared to 10 minutes for bitcoin, the average time for the
recommended number of confirmations is only six minutes for ethereum as against 60 minutes for bitcoin. Note
also that the accidental fork in the bitcoin blockchain on 11 March 2013 lasted for 24 blocks and six hours: see V.
Buterin, “Bitcoin Network Shaken by Blockchain Fork”, Bitcoin Magazine (12 March 2013).
66
Above, n. 65.
67
See text accompanying nn. 137-139.
E. Blockchains as Databases
This leads to the next point: the attributes of the blockchain must be differentiated from
the attributes of other applications that run “on” the blockchain or form part of a “blockchain
system.” The differentiation requires an understanding of the technical limitations of the
original blockchain. In a centralised database, modifications to its contents can only be made
by a single entity, subject always to judicial oversight where asset registries are concerned.
This entity controls the contents of the database and determines what other entities have read
and write permissions, if any. By contrast, in a decentralised blockchain database,
modifications can, in theory, be made by any node. Given that the individual nodes cannot be
trusted and no single entity controls such modifications, the database itself must be trusted and
incorruptible. This in turn requires the restriction of the type of permissible modifications and
the manner of performing them.71 In short, if no one is in control and anyone has the right to
modify the database, such modifications must be kept simple. Broadly speaking, an increase
in the complexity of transactions that can be supported by a blockchain requires that the
blockchain be equipped with additional functionalities, including the ability to accept external
input – protocol layers must be added on top of them.72 Consequently, unless the usability of
blockchains is to be confined to the generation and transfer of native crypto-assets,
68
See text accompanying nn. 50-55.
69
Low and Teo, above n. 31, at pp. 254-259.
70
Low and Teo above n. 31, at pp. 252-254.
71
G. Greenspan, “Why Many Smart Contract Use Cases Are Simply Impossible”, Coindesk (April 17, 2016) at
https://www.coindesk.com/three-smart-contract-misconceptions (accessed 6 December 2018).
72
Above n. 20, at p. 218.
One of the most oft-cited use cases for the blockchain in the law is as a form of distributed
asset registry. There are now a host of initiatives, both public and private, applying the
blockchain to a variety of assets ranging from land74 to securities75 to intellectual property.76
Many of these initiatives are seriously misguided. This is not to say that it is impossible to have
blockchain asset registries. Rather, many blockchain-enthusiasts have underestimated the
complexities involved in the creation and maintenance of a registry and/or overestimated the
vaunted “security” of blockchains.
First, to the extent that many of these early initiatives are entirely private, they will not be able
to provide the sort of proof of ownership of the underlying assets that a public registry can
provide. In this respect, we are referring not to the public or private nature77 of the blockchain
employed but the involvement or in this case, lack thereof, of government and hence, the law.
Some of these private initiatives employ permissioned blockchains but many employ
permissionless blockchains. Many initiatives, especially because they tout the immutability of
blockchains,78 implicitly assume that registries provide an authoritative record of ownership.
This stems in part from a failure to distinguish between the thing that is the object of ownership
and the record of the right to the thing. This is self-evident in bitcoin, where the object of
73
This can be illustrated by, for example, the Hyperledger architecture, which provides the technical framework
for permissioned blockchains and distinguishes between different components in this framework Hyperledger
Architecture, Volume II, Smart Contracts, p. 3 https://www.hyperledger.org/wp-
content/uploads/2018/07/HL_Whitepaper_IntroductiontoHyperledger.pdf (accessed 6 December 2018).
74
A project to establish a blockchain land registry in Honduras was much lauded as an instance of using the
blockchain’s “trustless trust” to fill the vacuum of trustworthy institutions in a developing economy: “The Great
Chain of Being Sure About Things”, The Economist (31 October 2015). For more details of the Honduras project
and a more skeptical view, see V. L. Lemieux, “Trusting Records: Is Blockchain Technology the Answer?” (2016)
26 R. M. J. 110. See also N. Kshetri, “Will Blockchain Emerge as a Tool to Break the Poverty Chain in the Global
South?” (2017) 38 T.W.Q. 1710. Sweden appears to be the most notable developed economy to explore a
blockchain land registry: see Kairos Future, “The Land Registry in the Blockchain-Testbed” (March 2017)
https://chromaway.com/papers/Blockchain_Landregistry_Report_2017.pdf See also J. McMurren, A. Young, and
S. Verhulst, “Addressing Transaction Costs Through Blockchain and Identity in Swedish Land Transfers”
(October 2018) https://blockchan.ge/blockchange-land-registry.pdf
75
The Australian Stock Exchange has decided to replace its Clearing House Electronic Subregister System
(CHESS) system with one using distributed ledger technology: see Australian Stock Exchange, “CHESS
Replacement: New Scope and Implementation Plan Consultation Paper” (April 2018)
https://www.asx.com.au/documents/public-consultations/chess-replacement-new-scope-and-implementation-
plan.pdf (accessed 1 March 2019). Luxembourg passed Bill 7363, which supposedly grants transactions conducted
on a blockchain the same legal status as those conducted traditionally, on 14 February 2019, an informal English
translation is available at https://www.letzblock.com/blog/draft-luxembourg-law-7363 (accessed 1 March 2019).
76
See text accompanying nn. 115-120.
77
See text accompanying nn. 24-39.
78
See text accompanying nn. 56-74.
10
Although many do not perceive the difference in form between native crypto-assets and
so-called electronic bank money,80 the legal nature of these two forms of assets could hardly
be more different. Native crypto-assets 81 may well be electronic assets properly so-called
because their legal nature is irrevocably tied to the electronic blockchain register.82 But that is
not the case with so-called electronic bank money. Money held in bank accounts is today firmly
established in most legal systems as taking the legal form of in personam claims against the
bank.83 This was not always the case84 but the historical position is now irrelevant and it is its
modern form that permits its “transfer” in the sense that is so misunderstood today. Such
property is intangible and formless. Any register’s representation of property is merely a record
of the property right rather than the property right itself. The temptation to confuse the record
with the right is easily dispelled when we examine registers recording tangible assets. Many
jurisdictions with developed economies have well-established land registers and these registers
are increasingly migrating from paper to electronic form. 85 Yet no one supposes that the
transition results in land, as opposed to its record, existing in electronic form.
The confusion stems in part from a key difference between tangible and intangible
property. The category of tangible property coincides with the category of in rem rights strictly
so-called and, insofar as property is regarded as a right rather than a thing, such property entail
rights that relate to things, or res to employ the Latin, that are separable from and distinct from
the right. 86 While some would confine the category of property to such rights, 87 and it is
arguable that the civilian traditions, particularly those with Germanic roots, follow such a
narrow conception of property,88 this is not true of common law systems. Common law systems
have a long tradition of regarding choses in action as personal property. But it is important to
observe that such property differs from that of tangible property in important respects. Unlike
79
See Satoshi Nakamoto, (October 2008) “Bitcoin: A Peer-to-Peer Electronic Cash System”
https://bitcoin.org/bitcoin.pdf at 2.
80
See, for example, Morten Bech and Rodney Garratt, ‘Central Bank Cryptocurrencies,’ BIS Quarterly Review,
September 2017, at 60, “Graph 3 The Money Flower: A Taxonomy of Money.”
81
Provided they are not securities. Cf. Jay Clayton, Chairman, U.S. Securities and Exchange Commission,
“Statement on Cryptocurrencies and Initial Coin Offerings” (11 December 2017). But see Financial Conduct
Authority Feedback Statement FS17/4, “Distributed Ledger Technology” (December 2017).
82
See K. F. K. Low and E. Teo, “Legal Risks of Owning Cryptocurrencies” in D. Lee and R. Deng (eds),
Handbook of Blockchain, Digital Finance, and Inclusion, Volume 1 (London: Academic Press, 2017), 225 at pp.
241-242.
83
For the common law, see Foley v Hill (1848) 2 H.L.C. 28, 9 E.R. 1002. Cf. S. Meder, “Giro Payments and the
Beginnings of the Modern Cashless Payment System” in D. Fox and W. Ernst (eds), Money in the Western Legal
Tradition: Middle Ages to Bretton Woods (Oxford: Oxford University Press, 2016) at p. 409.
84
B. Geva, “‘Bank Money’: The Rise, Fall, and Metamorphosis of the ‘Transferable Deposit’” in D. Fox and W.
Ernst (eds), Money in the Western Legal Tradition: Middle Ages to Bretton Woods (Oxford: Oxford University
Press, 2016) at p. 359.
85
See, eg, R. Low, “From Paper to Electronic: Exploring the Fraud Risks Stemming From the Use of Technology
to Automate the Australian Torrens System” (2009) 21 Bond L. Rev. 107.
86
B. McFarlane and S. Douglas, “Defining Property Rights” in J. Penner and H. Smith (eds), Philosophical
Foundations of Property Law (Oxford: Oxford University Press, 2013) at p. 219.
87
Ibid.
88
See K. F. K. Low and Y. C. Wu, “The Characterisation of Cryptocurrencies in East Asia” in D. Fox and S.
Green (eds), Private and Public Law Implications of Cryptocurrencies (Oxford: Oxford University Press, 2019,
forthcoming) and K. Takahashi, “Cryptocurrencies Entrusted to an Exchange Provider: Shielded from the
Provider’s Bankruptcy?” in C. Hugo (ed.) Annual Banking Law Update 2018: Recent Legal Developments of
Special Interest to Banks (Johannesberg: Juta Law Publishers, 2018) at p. 1.
11
The absence of a separable object renders it easier to confuse right with record,
especially where the record, like the right, is itself also intangible. We see the same temptation
to confuse right and record with carbon credits in Armstrong DLW GmbH v Winnington
Networks Ltd, where carbon credits recorded in electronic registries were regarded as existing
“only in electronic form”.91 A similar confusion between right and record can be found in
Article 2(2) of Directive 2009/110/EC of the European Parliament and of the Council, which
defines “electronic money” as “electronically, including magnetically, stored monetary value
as represented by a claim on the issuer which is issued on receipt of funds for the purpose of
making payment transactions … and which is accepted by a natural or legal person other than
the electronic money issuer”.92 That which is stored electronically is not value per se but a
record of a claim that is valuable and the muddle between record, claim, and value can lead to
much unnecessary confusion.93 This same confusion can be found in one of Wyoming’s many
new blockchain “enabling” laws, which defines “digital asset” as “a representation of
economic, proprietary or access rights that is stored in a computer readable format”.94
Unlike the case for native crypto-assets,95 the use of blockchain technology as an asset
registry system poses entirely different challenges. These pre-existing rights are subject to well-
established rules of law, particularly in relation to their transfer. Any record keeping system
that is not fully compatible with these existing legal rules will therefore require legal
amendments in order to be effective. Contrary to popular belief, public registration systems are
remarkably heterogeneous so far as their role as indicia of title is concerned. Some registration
systems provide prima facie evidence of title such as in the case of shares,96 patents,97 and
registered designs.98 Some registration systems, such as that for trademarks, do not purport to
provide any indication as to title at all, prima facie or otherwise.99 Where this is the case, such
as for bank ledgers, “in the absence of fraud, the customer is not precluded by the bank
statement or the pass-book from disputing an error or an incorrect debit made by the bank or
89
W. Blackstone, Commentaries on the Laws of England, Book II: Of the Rights of Things (Clarendon Press:
Oxford, 1766) at p. 389.
90
K. F. K. Low and J. Lin, “Carbon Credits as EU Like It: Property, Immunity, TragiCO 2medy?” (2015) 27 J.E.L.
377 at 402.
91
[2013] Ch 156, [49].
92
It is notable that, in its original implementation of the EU legislation, Germany took pains to describe such
“electronic money” as “Werteinheiten in Form einer Forderung gegen die ausgebende Stelle, die auf
elektronischen Datenträgern gespeichert sind” (units of account in the form of a claim against the issuing entity,
which are recorded on electronic media): Section 1(14), Kreditwesengesetz. But contra Section 1(2),
Zahlungsdiensteaufsichtsgesetz.
93
For carbon credits, see above n. 90.
94
Wyo. Stat. Ann. §34‑29‑101. The law envisages three categories of “digital assets”: (i) digital consumer assets;
(ii) digital securities; and (iii) virtual currencies. To the extent that the last category encompasses native crypto-
assets, this may be accurate but the first two categories clearly envisage the digital record as reflecting off-chain
enforceable legal rights.
95
Low and Teo, above n. 31 at 252-254.
96
Companies Act 2006, s 127.
97
Patents Act 1977, s 32(9), although its operation in this respect is arguably somewhat indirect.
98
Registered Designs Act 1949, s 17(8).
99
Trade Marks Act 1994.
12
Accordingly, private registers cannot guarantee title and are at best the basis of a
contractual agreement as to risk allocation among participants, with many probably even failing
to amount to such. Given the origins of the blockchain in bitcoin and the comparison of its
blockchain to bank ledgers, it is pertinent to explain why bank ledgers, a private arrangement
between banker and customer, are a poor foundation upon which to build aspirations for private
blockchain asset registries. First, the nature of bank money as an asset and the means of their
“transfer” make them an inapposite case study for most other instances of property dealing.
Because bank money essentially takes the form of a debt, they are fundamentally contractual
in nature. As a result, it is theoretically within the rights of the parties to the contract, being the
bank and its customer, to agree upon the scope of its availability within the limits of freedom
of contract. But any agreement by two or more parties to the effect that other property would
behave in a particular manner different to the default rules established by the law would fall
foul of the numerus clausus (Latin for closed number) principle,105 which limits the types of
proprietary rights the law recognises.
100
E. P. Ellinger, E. Lomnicka and C. V. M. Hare, Ellinger's Modern Banking Law 5th edn. (Oxford: Oxford
University Press, 2011) at p. 236.
101
Land Registration Act 2002, s 58(2).
102
Cf. The Law Commission’s description of the Land Registration Act 2002 as endorsing “qualified
indefeasibility”: Law Commission Report No 271, Land Registration for the Twenty-First Century: A
Conveyancing Revolution (2001) at p. 221.
103
Land Registration Act 2002, s. 32(3).
104
Cf. Low and Teo, above n. 31 at 254-259. See also Yeung, above n. 12 at 214.
105
B. Rudden, “Economic Theory v Property Law: The Numerus Clausus Problem” in J. Eekelaar and J. Bell
(eds.), Oxford Essays in Jurisprudence, 3rd series, (Oxford: Oxford University Press, 1987), at p. 262. See also
13
T. W. Merrill and H. E. Smith, “Optimal Standardization in the Law of Property: The Numerus Clausus Principle”
(2000) 110 Y.L.J. 1; T. W. Merrill and H. E. Smith, “The Property/Contract Interface” (2001) 101 Colum. L. Rev.
773; B. Akkermans, “The Numerus Clausus of Property Rights” in M. Graziadei and L. Smith (eds.), Comparative
Property Law (Cheltenham: Edward Elgar Publishing, 2017), at p. 100.
106
M. Smith and N. Leslie, The Law of Assignment, 3rd edn (Oxford: Oxford University Press, 2018) at pp. 213-
221, 230-234. See also C. H. Tham, “Joinder of equitable assignors of equitable and legal choses in action” [2017]
LMCLQ 537, at 542–549.
107
D. Fox, Property Rights in Money (Oxford: Oxford University Press, 2008), at para [5.05].
108
B. Geva, “’Bank Money’: The Rise, Fall, and Metamorphosis of the ‘Transferable Deposit’” in D. Fox and W.
Ernst (eds), Money in the Western Legal Tradition: Middle Ages to Bretton Woods (Oxford: Oxford University
Press, 2016) 359, at p. 360. Cf. Cf. B. Geva, “The Order to Pay Money in Medieval Continental Europe” in D.
Fox and W. Ernst (eds), Money in the Western Legal Tradition: Middle Ages to Bretton Woods (Oxford: Oxford
University Press, 2016) 409.
109
Above n. 107 at paras [5.70]-[5.73].
110
Above n. 107 at paras [5.25]-[5.32].
111
M. Brignall, “So You Think You’re Safe Doing Internet Banking?”, The Guardian (21 November 2015). See
also I. Becker et al, “International Comparison of Bank Fraud Reimbursement: Customer Perceptions and
Contractual Terms”, Workshop on the Economics of Information Security (WEIS), 13-14 June 2016, Berkeley,
CA, USA.
112
“Banking: Conduct of Business Sourcebook” (Release 34: December 2018), paras [5.1.11]-[5.1.12].
113
Schedule 2 of the Competition and Consumer Act 2010 (Cth), replacing the Trade Practices Act 1974 (Cth).
14
114
Contractual prohibitions of assignments do not actually effectively prevent the assignment of the property. For
chattels, see Taddy & Co v Sterious & Co [1904] 1 Ch 354; Mcgruther v Pitcher [1904] 2 Ch 306; London County
Council v Allen [1914] 3 KB 642; Dunlop Pneumatic Tyre Co Ltd v Selfridge and Co Ltd [1915] AC 847; Barker
v Stickney [1919] 1 KB 121. For leases, see Williams v Earle (1868) LR 3 QB 739; Old Grovebury Manor Farm
v W Seymour Plant Sales and Hire Ltd (No 2) [1979] 1 WLR 1397. Cf. Linden Gardens Trust Ltd v Lenesta Sludge
Disposals Ltd [1994] 1 AC 85 in relation to purely contractual choses in action; Tulk v Moxhay (1848) 2 Ph 774
in relation to restrictive covenants for land.
115
http://open-music.org/ (accessed 6 December 2018).
116
https://www.blokur.com/ (accessed 6 December 2018).
117
http://myceliaformusic.org/ (accessed 6 December 2018).
118
https://soundac.io/ (accessed 6 December 2018).
119
https://ujomusic.com/ (accessed 6 December 2018).
120
See text accompanying nn. 190-195.
121
For shares (Companies Act 2006, s 127), patents (Patents Act 1977, s 32(9)), and registered designs (Registered
Designs Act 1949, s 17(8)), registration merely provides prima facie evidence of title.
122
See, e.g., Trade Marks Act 1994.
123
F. Sheppard and V. Belcher, “The deeds registries of Yorkshire and Middlesex” (1980) 6 J. Soc. Arch. 274.
15
For common law systems, both the common law’s default rule, which is nemo dat quod
non habet,130 as well as equity’s maxim, qui prior est tempore potior jure,131 favour static
security. The unfortunate consequence of this policy was that conveyancing became
cumbersome, expensive and fraught with risk. Title registration along the lines of the Torrens
statutes and more modern English land registers “decisively shifted the conveyancing law
towards the opposing principle of dynamic security.” 132 By making registration more
authoritative, conveyancing was simplified but carried an often forgotten cost. A shift from
static to dynamic security does not in and of itself prevent fraud, as a comparative analysis of
Singapore and Malaysia, both operating Torrens systems, tellingly demonstrates.133 All it does
is shift losses when frauds occur and property owners are occasionally rudely reminded of the
high cost of dynamic security. For example, in 2006 in Singapore, a 90 year old Bebe bte
Mohammad, who was suffering from Alzheimer’s disease, was defrauded of her property when
124
For background as to how the Torrens system was conceived, developed and eventually born, see P. M. Fox,
“The Story behind the Torrens System” (1950) 23 A. L. J. 489. Cf S. Robinson, Transfer of Land in Victoria
(Sydney: Law Book Company, 1979), at para [1-25].
125
For a list of jurisdictions that have adopted a Torrens system of land registration, see S. R. Simpson, Land Law
and Registration (New York: Cambridge University Press, 1976) 81; M. Raff, Private Property and
Environmental Responsibility (The Hague: Kluwer Law International, 2003) at p. 9.
126
T. B. F. Ruoff, An Englishman Looks at the Torrens System (Sydney: Law Book Company, 1957).
127
K. Gray and S. F. Gray, Land Law, 7th Ed (Oxford: Oxford University Press, 2009), at para [2-044].
128
Ibid. See also Law Commission Consultation Paper No. 254, “Land Registration for the Twenty-First Century:
A Consultative Document” (1998); Law Commission Consultation Paper No. 227, “Updating the Land
Registration Act 2002: A Consultation Paper” (2016).
129
R. Demogue, “Security” in A. Fouilleé, J. Charmont, L. Duguit and R. Demogue (eds), F. W. Scott and J. P.
Chamberlain (trans), Modern French Legal Philosophy (New York: The Macmillan Company, 1968) at p. 418.
130
No one may give what he does not have.
131
He who is earlier in time is stronger in law.
132
P. O’Connor, “Registration of Title in England and Australia: A Theoretical and Comparative Analysis” in E
Cooke (ed), Modern Studies in Property Law Vol 2 (Oxford: Hart Publishing, 2003) at pp. 85-86.
133
H. W. Tang and K. C. Loh, “A Law Which Favours Forgers: Land Fraud in Two Torrens Jurisdictions” (2011)
19 Australian Property Law Journal 130, highlighting the different incidences of fraud in the two Torrens
jurisdictions. As Singapore used to be part of Malaysia from 1963-1965, the comparison of the two jurisdictions
is particularly instructive. In Singapore, land fraud is remarkably uncommon. In Malaysia, it is significantly more
widespread.
16
The “insurance principle” underlying most Torrens registration systems is also telling.
Although often heralded as the third140 key principle of Torrens registration, it was most likely
established to overcome the hostilities of vested interests opposed to the shift from static to
dynamic security.141 However, insurance needs to be funded and unless taxes are raised, this
can only be achieved through higher transaction fees but this partly recreates one of the
problems title registration was supposed to solve. That title registration legislation is not some
magic wand that will cure all ills can be seen in the Hong Kong experience, where differences
over the adequacy of insurance have prevented the Land Titles Ordinance,142 enacted in 2004,
from being brought into force.143
There is a further cost to the shift to title registration – all such systems operate in a
“bijural” fashion.144 They are bijural in the sense that they straddle two conflicting bodies of
law. Many title registration systems confer title to the interest recorded regardless of the
validity of the registered instrument. Whilst in theory no void instrument should ever be
registered, in practice some defects will pass undetected by the registry and appear on the
register. This necessitates a system of rules to determine when such registrations may be set
aside or overridden. Bijuralism demonstrates that whilst modern title registration systems are
more authoritative, 145 they are not absolutely authoritative. An absolute monojural title
134
United Overseas Bank Ltd v Bebe bte Mohammad [2006] 4 SLR(R) 884; [2006] SGCA 30. Fortunately for
Bebe, she could avail herself of the state insurance despite the relatively parsimonious regime operating in
Singapore: see B. Crown, “Whither Torrens Title in Singapore?” (2010) 22 S.Ac.L.J. 9. Cf. H.W. Tang, and
K.F.K. Low, Tan Sook Yee’s Principles of Singapore Land Law, 4th edition (Singapore: LexisNexis, 2019) at pp.
268-269.
135
New Zealand Land Transfer Act 2017, ss. 54-57, introducing the controversial concept of manifest injustice.
136
S. Keenan, “From historical chains to derivative futures: Title registries as time machines” (2019) 20 Soc. &
Cult. Geogr. 283.
137
Cf Lemieux, above n. 74.
138
A. Mizrahi. “Factom CEO: Blockchain-based Transparent Mortgages Can Restore Trust in Markets.” Finance
Magnates (3 March 2016) at www.financemagnates.com/cryptocurrency/interview- 2/factom-ceo-blockchain-
based-transparent-mortgages-can-restore-trust-in-markets/ (accessed 6 December 2018).
139
P. Rizzo, “Blockchain Land Title Project ‘Stalls’ in Honduras”, Coindesk (26 December 2015) at
https://www.coindesk.com/debate-factom-land-title-honduras (accessed 1 March 2019).
140
Alongside the “mirror principle” and the “curtain principle”.
141
R. T. J. Stein and M. A. Stone, Torrens Title (Sydney: Butterworths, 1991) at p 349-350; R A Woodman and
P J Grimes, Baalman on The Torrens System in New South Wales 2nd edition (Sydney: Law Book Company,
1974) at p. 389.
142
Cap 585.
143
N. Ng, “Overdue law on land titles could have simplified flat-buying in Hong Kong, Audit Commission says”,
South China Morning Post (23 November 2017).
144
P. O’Connor, “Deferred and Immediate Indefeasibility: Bijural Ambiguity in Registered Land Title Systems”
(2009) 13 Edinburgh Law Review 194 at 195-196.
145
Cf Land Registration Act 2002, s 58(1).
17
146
Low and Teo, above n. 31 at p. 240.
147
C. M. Rose, “Crystals and Mud in Property Law” (1988) 40 Stan L Rev 577. See also H. E. Smith, “Rose’s
Human Nature of Property” (2011) 19 Wm. & Mary Bill. Rts. J. 1047.
148
Land Registration Act 2002, Sch 4, paras 1 and 2.
149
L. Lamport, R. Shostak and M. Pease, “The Byzantine Generals Problem” (1982) 4 ACM Transactions on
Programming Languages and Systems 382.
150
Above n. 149, at 384-387.
151
M. Vukolić, “The Quest for Scalable Blockchain Fabric: Proof-of Work vs. BFT Replication,” in: J.
Camenisch and D. Kesdoğan (eds) Open Problems in Network Security (2016) Lecture Notes in Computer
Science, vol 9591 (New York: Springer, 2016).
18
Although these security flaws are concerning, the main difficulty with transposing
computer science approaches to security onto those of property law is one of incompatible
perspectives. In designing distributed computer systems, computer scientists generally focus
on network security. However, the weakest link in any computer network is invariably the end
user rather than the network hardware or software. Whilst securing the machines rather than
their human users may be the best that computer scientists can do, such an approach is wholly
inadequate as a matter of property law to support a transition to unqualified dynamic security.
Transfers on a blockchain are initiated by the use of private keys, which act like passwords
when accessing the blockchain-based accounts identified by public keys. Whilst asymmetric
key cryptography, which underlies the private-public key pair, is extremely secure when it
comes to ensuring the integrity and secrecy of communications, it cannot determine that the
private key was used by its rightful holder – a point recently emphasised by the Law
Commission. 158 There is an undisputable, mathematical link between the private and public
key, but there is no similar link between a private key and its user.159 End users must maintain
a delicate balance between maintaining absolute secrecy of one’s private key and
simultaneously ensuring that it has sufficient backups in case a copy of the key is inadvertently
152
https://www.mail-archive.com/[email protected]/msg09997.html (accessed 6 December 2018).
153
de Vries, above n. 32. Cf. J. Becker et al, “Can We Afford Integrity by Proof-of-Work? Scenarios Inspired by
the Bitcoin Currency” in R. Böhme (ed), The Economics of Information Security and Privacy (New York:
Springer, 2013) at p. 135.
154
See text accompanying nn. 64-66.
155
I. Eyal and E. G. Sirer, “Majority is not enough: Bitcoin mining is vulnerable” in N. Christin and R. Safavi-
Naini (eds), Financial Cryptography and Data Security – 18th International Conference, FC 2014 (2014) at p.
436.
156
A. Hertig, “Blockchain's Once-Feared 51% Attack Is Now Becoming Regular”, Coindesk (8 June 2018) at
https://www.coindesk.com/blockchains-feared-51-attack-now-becoming-regular/; J. I. Wong, “Every
cryptocurrency’s nightmare scenario is happening to Bitcoin Gold”, Quartz (24 May 2018) at
https://qz.com/1287701/bitcoin-golds-51-attack-is-every-cryptocurrencys-nightmare-scenario/. (both accessed 6
December 2018).
157
See text accompanying n. 61.
158
Above n. 50 at p. 16.
159
C. Ellison and B. Schneier, “Ten Risks of PKI: What You’re Not Being Told about Public Key Infrastructure”
(2000) 16 Computer Security Journal 1 at p. 2. See also S. Mason and T. S. Reiniger, “‘Trust’ Between Machines?
Establishing Identity Between Humans and Software Code, or whether You Know it is a Dog, and if so, which
Dog?” (2015) 21(5) C.T.L.R. 135, deliberately referencing the famous New Yorker cartoon by Peter Steiner with
the caption, “On the Internet, nobody knows you’re a dog” (5 July 1993).
19
C. Essential “Centralisation”?
One common refrain among enthusiasts advocating blockchain asset registries is that
decentralisation will speed up certain transactions by eliminating intermediaries and
160
Cf. R. Armstrong, “Cryptocurrency exchange boss’s death locks away $150m in digital assets”, Financial
Times (6 February 2019), detailing the loss of US$150m worth of crypto-assets following the alleged death of
QuadrigaCX founder, Gerald Cotten, supposedly the only person who could access the private keys to several
cold wallets. But see C. Stokel-Walker, “The QuadrigaCX Crypto Mystery Deepens as Wallets Turn up Empty”,
Wired UK (4 March 2019).
161
Low and Teo, above n. 82, at p. 236.
162
I. Kaminska “Bitcoin Bitfinex exchange hacked: the unanswered questions”, Financial Times (4 August 2016).
163
N. Popper, “Identity Thieves Hijack Cellphone Accounts to Go After Virtual Currency”, The New York Times
(21 August 2017).
164
B. Schneier, “Semantic Attacks: The Third Wave of Network Attacks”, Crypto-Gram (15 October 2000) at
https://www.schneier.com/crypto-gram/archives/2000/1015.html#1. See also M. Evans, et al, “Human behaviour
as an aspect of cybersecurity assurance” (2016) 9 Security and Communications Networks 4667; C. Ellison and
B. Schneier, above n. 159, at p. 4.
165
L. Coleman, “Researcher has bitcoin stolen off his back in a public experiment”, Crypto Coins News (11
November 2015) at https://www.ccn.com/researcher-bitcoin-stolen-off-back-public-experiment/ (accessed 6
December 2018).
166
N. Popper, “Bitcoin Thieves Threaten Real Violence for Virtual Currencies”, The New York Times (18
February 2018).
167
See text accompanying nn. 229-233.
168
Joint Law Society and HM Land Registry Note, Property and Title Fraud (September 2017).
169
See, e.g., A. Das et al, “The Tangled Web of Password Reuse” in NDSS 2014 at
http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/06_1_1.pdf; J. Hong, “The State of
Phishing Attacks” (2012) 55 Communications of the ACM 74.
170
Low and Teo, above n. 82, at p. 242, drawing on the broader Internet experience for the elderly, for which see
E. L. Carlson, “Phishing for Elderly Victims: As the Elderly Migrate to the Internet Fraudulent Schemes Targeting
them Follow” (2007) 14 The Elder Law Journal 423, at pp. 424, 428-9.
171
B. Schneier, “There’s No Good Reason to Trust Blockchain Technology”, Wired (6 February 2019).
20
It may be that improving the speed of transactions is more desirable in financial markets
but does the use of a blockchain per se permit the elimination of intermediaries and the
simplification of the processes of clearing and settlement? Although this is widely assumed to
be the case among blockchain enthusiasts,175 it is only partially true. According to Geva, “[i]n
its narrow sense, ‘clearing system’ is a mechanism for the calculation of mutual positions
within a group of participants (‘counterparties’) with a view to facilitate the settlement of their
mutual obligations on a net basis. In its broad sense, the term further encompasses the
settlement of the obligations, that is the completion of payment discharging them.”176 Where
the subject of intermediation is securities, disintermediation through the use of blockchain
technology should not be too difficult, 177 particularly in jurisdictions like the UK, where
intermediation is not mandatory to begin with. 178 Since one of the main advantages of
intermediation was “the ease of trading and settlement”, 179 provided relevant legislation is
passed, the use of a blockchain could in theory provide similar ease of trading and settlement
without the need for intermediation. However, intermediation in securities ownership became
widespread not merely because they enabled faster transacting, but also because intermediaries
offered other services “such as record keeping, investment management services and the
provision of finance.”180 Considering that crypto-assets are native to decentralised blockchains,
the proliferation of crypto-asset exchanges suggests that there is a commercial demand for
intermediation that blockchains will not eliminate and a proposal for scaling bitcoin, the
Lightning Network,181 bears an eerie resemblance to clearing and settlement.182
172
See, eg, Y. Guo and C. Liang, “Blockchain application and outlook in the banking industry” (2016) 2 Financial
Innovation 24.
173
P. Critchley, “Taking Formalities Seriously” in S. Bright and J. Dewar (eds), Land Law: Themes and
Perspectives (Oxford: Oxford University Press, 1998) 507. For a more general discussion of the functions of
formalities, see Lon L Fuller, “Consideration and Form” [1941] 41 Columbia L Rev 799. Also see T. G. Youdan,
“Formalities for Trusts of Land, and the Doctrine of Rochefoucauld v Boustead” [1984] C.L.J. 306;
174
Joint Law Society and HM Land Registry Note, Property and Title Fraud (September 2017).
175
Cf. Australian Stock Exchange, “CHESS Replacement: New Scope and Implementation Plan Consultation
Paper”, above n 75, at p. 6.
176
B. Geva, “The Clearing House Arrangement” (1991) 19 Can. Bus. L. J. 138.
177
Cf. House of Commons Treasury Committee, 22nd Report of Session 2017-19, Crypto-Assets (12 September
2018) at p. 13.
178
L. Gullifer, “Ownership of Securities: The Problem Caused by Intermediation” in L. Gullifer and J. Payne
(eds), Intermediated Securities: Legal Problems and Practical Issues (Oxford: Hart Publishing, 2010) 1 at p. 2.
179
Above n. 178 at p. 3.
180
Above n. 178 at pp. 3-4.
181
J. Poon and T. Dryja, “The Bitcoin Lightning Network: Scalable Off-Chain Instant Payments” (Draft Version
0.5.9.2, 14 January 2016) at https://lightning.network/lightning-network-paper.pdf (accessed 1 March 2019).
182
R. Auer, “BIS Working Papers No 765: Beyond the Doomsday Economics of “Proof-of-Work” in
Cryptocurrencies” (January 2019) at pp. 20-21, available at https://www.bis.org/publ/work765.pdf (accessed 1
March 2019). Also see S. Coppola, “The Fat Controller of the Lightning Network”, Blog Post (17 January 2018)
21
22
All distributed ledgers, whether they employ blockchains or not, have the potential to fork (i.e.
develop inconsistencies). Network failures can leave some nodes unconnected to other nodes.
This is a problem for any distributed asset registry as one of the functions of a register is to
allow the public to determine who they should be dealing with in relation to a particular asset.
Such network failures cannot be wholly precluded and inconsistent records will be exacerbated
by the use of “proof-of-work” blockchains, which occasionally fork randomly even in the
absence of network failure. 190 Such temporary random forks are arguably inconsequential
where the particular asset is not constantly traded, such as land, where the time between
transactions tends to be measured in years rather than milliseconds. In that time, any prior
transaction to a particular plot of land would have been buried under hundreds of blocks and
any temporary aberrant fork long abandoned. However, it is less difficult to ignore for asset
classes which are actively traded on a consistent basis such as securities. To the extent that
some blockchain enthusiasts see the blockchain as accelerating even land transactions, such
random forks necessarily take on a more problematic manifestation.
However, even worse than these random temporary inconsistencies are the more lasting
hard forks191 (i.e. incompatible revisions) of the blockchain code, which though less common,
have occurred with disturbing frequency. The Ethereum blockchain famously forked
permanently into Ethereum (ETH) and Ethereum classic (ETC) in 2016 when a hard fork of its
code was adopted by a majority of nodes to reverse a hack192 but a minority persisted in running
the “classic” code. Bitcoin forked into bitcoin (BTC) and bitcoin cash (BCH) in 2017 over
ideological differences, before forking again into bitcoin gold (BTG) in the same year, and
forking and merging with ZClassic, itself a fork of an altcoin, ZCash, to form bitcoin private
(BTCP) in 2018. Most recently, in November 2018, bitcoin cash further forked into bitcoin
ABC (BCH ABC) and bitcoin SV (BSV). Such forks can have dramatic negative economic
consequences, as the recent fork of bitcoin cash demonstrated.193 Compared to forks of asset
registries of real world off-chain assets, however, such consequences are trivial as there is no
need to match forked registers to real world assets – a fork in a blockchain land registry does
not create a duplicate Blackacre Classic. The solution to the problem of forks is not obvious.
Taking the Ethereum hard fork as an example, it is not obvious that the choice of a majority of
users to adopt the revised code should prevail over that of the minority. The majority users’
decision to do so was obviously self-serving in that they wished to regain control over assets
189
Cf. M. Arnold, “Swift says blockchain not ready for mainstream use”, Financial Times (8 March 2018).
190
See text accompanying nn 65-67.
191
On forks more generally, see Low and Teo, above n. 31, at pp. 259-264.
192
See text accompanying nn. 213-217.
193
J. Kelly, “Bitcoin’s repeated splits undermine its long-term value”, Financial Times (19 November 2018).
23
“The first thing we do, let’s kill all the lawyers.”196 While crypto-enthusiasts have yet to incite
murder, there have been many claims of the impending disruption of the legal profession197 –
a “disruption” premised on the idea that “smart contracts” eliminate the need to trust the other
transacting party or to rely on traditional legal institutions, such as lawyers and courts.
Purportedly, “smart contracts” guarantee performance of the contractual obligations embedded
therein, eliminating disputes and dispensing with lawyers and courts. While “smart contracts”
may be an interesting tool that some lawyers may wish to familiarise themselves with, the
prophecies of widespread unemployment of lawyers stem from a poor understanding of both
“smart contracts” as a technical concept as well as how legal contracts support commerce.
A. Maybe Contracts?
At a technical level, smart contracts are self-executing ledger-modification instructions, e.g. “if
X occurs, send Y amount of tokens from account A to account B.” Attempts at analysing the
term from a legal (or technical) perspective are, however, rendered difficult by the existence of
a multitude of inconsistent definitions.198 Although the original definition of “smart contracts”
associates them with the embedding of legal terms in hardware and software to prevent breach
or to control assets by digital means, 199 the term has evolved to include many unrelated
concepts, 200 ranging from ERC20 tokens, Hyperledger Fabric’s ChainCode 201 to “stateful
194
See text accompanying 121-171.
195
Above, n. 75.
196
William Shakespeare, Henry VI, Part 2 (1591), Act IV, Scene 2.
197
S. Ozelli, “Smart Contracts Are Taking Over Functions of Lawyers: Expert Blog”, Cointelegraph (12 January
2018) at https://cointelegraph.com/news/smart-contracts-are-taking-over-functions-of-lawyers-expert-blog
(accessed 6 December 2018).
198
V. Buterin, ‘Ethereum White Paper: A Next Generation Smart Contract and Decentralized Application
Platform’ (2015) (https://github.com/ethereum/wiki/wiki/White-Paper); F. Zhang, et al., ‘Town Crier: An
Authenticated Data Feed for Smart Contracts’ (2016) Proceedings of the 2016 ACM SIGSAC Conference on
Computer and Communications Security 270.
199
N. Szabo, “Smart Contracts: Formalizing and Securing Relationships on Public Networks” (1997) 2 (9) First
Monday; for a broader review of smart contracts see: E. Mik, “Smart Contracts: Terminology, Technical
Limitations and Real-World Complexity” (2017) 9 L.I.T. 269.
200
See text accompanying nn 18-23.
201
Hyperledger Architecture, Volume II, Smart Contracts (April 2018) p. 8
https://www.hyperledger.org/wp/content/uploads/2018/04/Hyperledger_Arch_WG_Paper_2_SmartContracts.pd
f (last accessed 6 December 2018)
24
Setting aside those instances where the term is used in a strictly technical sense, the
common misconception that “smart contracts” have the potential to disrupt the legal system
derives from both the confusion in terminology and the assumption that the technical
characteristics of blockchains, decentralisation and trustlessness in particular, somehow render
traditional legal institutions redundant. The key term in the “smart contract” narrative is “self-
enforcement”. Purportedly, instead of being enforced by tradition legal institutions, “smart
contracts” can self-enforce “on” or be enforced “by” a blockchain, thus “strengthening
promissory obligations without state involvement.” 205 Unfortunately, the meaning of self-
enforcement remains unclear as it seems to conflate two distinct stages in the life of a contract:
performance and adjudication – a conflation built on top of the confusion between “rights” and
“records”. 206 The blockchain supposedly executes the “smart contract” in an unbiased and
unstoppable manner. Its performance is guaranteed as neither of the parties can change their
mind and refuse to perform. The execution of the code is thus synonymous with the
performance of the obligation embodied therein. If performance is guaranteed, however,
enforcement should not be required – assuming that “enforcement” refers to the ability to seek
judicial assistance in the event of breach. Performance and enforcement are mutually exclusive.
The assistance of the courts is only required if “things go wrong” – and “smart contracts”
purportedly prevent things from going wrong. Upon closer analysis, most “smart contracts” are
simply technological tools for automating the performance of certain obligations rather than a
source of obligations.207 To complicate matters, it has also sometimes been claimed that while
“smart contracts” eliminate the need for judicial enforcement, the parties retain the option to
do so.208 The underlying reasoning is that although legal enforcement is unnecessary, it should
remain possible. This approach seeks to reconcile the indiscriminate trust in technology with
the practical recognition that, for “smart contracts” to gain commercial acceptance, it helps that
they are legally enforceable.
202
I. Nikolic et al., “Finding the Greedy, Prodigal, and Suicidal Contracts at Scale” (2018)
https://arxiv.org/pdf/1802.06038.pdf (accessed 6 December 2018).
203
Above, n. 28 at 1.
204
For an overview of Distributed Applications , see: https://www.stateofthedapps.com (accessed 6 December
2018).
205
Above n. 34 at p. 357.
206
See text accompanying nn. 74-195.
207
J. Cieplak, S. Leefatt, “Smart Contracts: A Smart Way To Automate Performance” (2017) 1 Geo. L. Tech.
Rev. 417.
208
Above n. 34 at pp. 355, 356
25
There are also no legal obstacles with regards to consideration so far as common law
systems are concerned.214 Consideration need not be adequate, it only needs to be sufficient in
the eyes of the law.215 The focus is on reciprocity, not on equivalence of value. 216 The parties
can exchange money in return for goods or services, or bitcoins 217 in return for a music
download. One must be careful, however, not to equate “smart contracts” with transactions in
the technical sense within the blockchain environment. The latter are unilateral acts,218 though
in a “smart contract”, consideration will often take the form of such transactions, i.e. transfers
of crypto-assets from one account to another. The law in most legal systems is thus no obstacle
to “smart contracts” and no legal reform is necessary in order to “encourage” their adoption. It
is simple naiveté and wishful thinking that has seen the inflated promise of “smart contracts”
outstrip commercial adoption. If anything, the most pressing legal reform lies in identifying
209
H. Beale (gen. ed.) Chitty on Contracts, 32nd edn (Oxford: Sweet & Maxwell, 2015) at paras. 1-016, 2-001.
210
Above n. 196 at para. 4-001, J. Beatson, A. Burrows, J. Cartwright, Anson’s Law of Contract, 29th ed. (Oxford:
Oxford University Press, 2010) at p. 75.
211
Thornton v Shoe Lane Parking Ltd [1971] 2 QB 163.
212
M. Gimmy, Vertragsschluss im Internet, in D. Kroeger and M. Gimmy (eds), Handbuch zum Internetrecht
(Berlin: Springer, 2000) at p. 86.
213
Consider the 2010 flash crash that is widely considered to have been exacerbated by high frequency algorithmic
trading: see the Joint Report of the Commodity Futures Trading Commission and Securities Exchange
Commission, “Findings Regarding the Market Events of May 6, 2010” (30 September 2010) at
https://www.sec.gov/news/studies/2010/marketevents-report.pdf (accessed 1 March 2019). For a popular account,
see M. Lewis, Flash Boys: A Wall Street Revolt (New York: W. W. Norton & Company, 2014). See also C.
Clearfield and J.O. Weatherall, “Why the Flash Crash Really Matters”, Nautilus (23 April 2015). Consider also
the spectacular failure of algorithmic automation that contributed to the fatal crashes of Lion Air Flight 610 and
Ethiopian Airlines Flight 302 and the grounding of Boeing 737 Max jets worldwide: J. Nicas, N. Kitroeff, D.
Gelles and J. Glanz, “Boeing Built Deadly Assumptions Into 737 Max, Blind to a Late Design Change”, The New
York Times (1 June 2019). See also M. Minasi, The Software Conspiracy (New York: McGraw-Hill, 2000), at pp.
43-44, describing the bug that led to the crash of Korean Airlines Flight 801 on 6 August 1997, again involving
Boeing, and at pp. 23-24, describing the infamous GM litigation involving a bug that affected the fuel injector of
the Chevrolet 2500 pickup truck. For the judgment in the latter case, see General Motors v Johnston, 592 So 2d
1054, 1992 (Supreme Court of Alabama).
214
For the civil law equivalent, see M. Chen-Wishart, “Consideration and Serious Intention” [2009] Sing JLS 434
at 453-455.
215
Chappell & Co. Ltd. v. Nestle Co. Ltd. [1960] A.C. 87 (H.L.); Bainbridge v Firmstone [1960] AC 87.
216
Currie v Misa (1875) LR 10 Ex 153.
217
Bearing in mind its controversial status as a currency: see above n. 31.
218
See text accompanying nn. 45-46.
26
B. Guaranteeing Performance?
The main selling point of “smart contracts” is their purported ability to reduce transaction costs
by eliminating the need to trust the other transacting party by technologically precluding the
possibility of breach. Code is final, deterministic and impartial, and hence superior to humans,
who are indecisive, unpredictable, and biased. Once a “smart contract” is set in motion upon a
blockchain – its code cannot be changed219 and its execution cannot be stopped. Performance
is guaranteed because any subsequent human interference is impossible. Alas, this both
overestimates the technical capabilities of “smart contracts” and underestimates the difficulties
of the contracting process.
First, the blockchain narrative often fails to distinguish between the code of the
blockchain and the code of “smart contracts.” As indicated, applications running “on top of”
or connecting to the blockchain do not share its characteristics. Thus, “smart contracts” running
on blockchains are not even trustless to the limited extent that the blockchains may be.220 As
“smart contracts” may control the transfer of crypto-assets and tokens, a coder tasked with
writing a “smart contract” has an economic incentive to intentionally include “errors,” such as
“backdoors,” designed to steal such assets. To the extent that consensus algorithms, such as
“proof of work,” may curb incentives to behave selfishly,221 they are irrelevant to the coding
of “smart contracts” since the latter are created off-chain before being deployed on the
blockchain. The open source character of “smart contracts” is generally irrelevant as it is
impossible to establish how they will operate without subjecting them to extensive testing. The
ability to inspect the code cannot guarantee its quality. Moreover, as most parties will likely
lack the expertise to evaluate the viability of a particular “smart contract,” they will have to
rely on external security audits.222 In effect, in order to trust the code of a “smart contract”, the
parties will have to trust its coder(s) and/or its auditor(s). It is also notable that “smart
contracts,” as a technological innovation, predate the blockchain.223 What the blockchain adds
to “smart contracts” is that it ensures the integrity of their code and guarantees their
decentralised and hence secure execution. Once activated on the blockchain, the “smart
contract” becomes immutable to the same extent as their host blockchain.224 While blockchain-
based “smart contracts” can achieve the same limited immutability as blockchains, it should
not be assumed that immutability is necessarily desirable.225 The inability to alter the code of
the “smart contract” will prevent the correction of errors or the introduction of new
functionality that reflect changed commercial circumstances.
219
See text accompanying nn. 56-69; but see B. Marino, A. Juels, “Setting standards for altering and undoing
smart contracts” in A. J. Bertossi et al (eds) Rule Technologies. Research, Tools, and Applications, Lecture Notes
in Computer Science, vol 9718 (New York: Springer, 2016).
220
See text accompanying nn. 34-38.
221
See text accompanying nn. 28-33.
222
N. Atzei, M. Bartoletti, and T. Cimoli, “A Survey of Attacks on Ethereum Smart Contracts (SoK),” in M.
Maffei and M. Ryan (eds), Proceedings of the 6th International Conference on Principles of Security and Trust -
Volume 10204 (New York: Springer, 2017) at pp.6, 10, 11; K. Bhargavan,et al., “Formal Verification of Smart
Contracts: Short Paper,” in T. Murray and D. Stefan (eds), Proceedings of the 2016 ACM Workshop on
Programming Languages and Analysis (New York: NY ACM, 2016) at p. 91.
223
Szabo, above n. 186.
224
See text accompanying nn. 67-69.
225
See text accompanying nn. 245-254. Cf. Arnold v Britton [2015] UKSC 36; [2015] 2 W.L.R. 1593. See also
S. Blandy, S. Bright, and S. Nield, “The Dynamics of Enduring Property Relationships in Land” (2018) 81 M.L.R.
85.
27
This does not, however, prevent blockchain enthusiasts from agreeing that the code
comprises the entire agreement in a manner not unlike an “entire contracts clause”, as happened
in the most infamous of “smart contracts”, the DAO (or Decentralised Autonomous
Organisation). The DAO was set up as an investment fund on the ethereum blockchain in which
investment decisions would be voted upon by investors rather than left to fund managers.229
After attracting more than US$168m worth of crypto-asset, a bug230 in its code allowed a
“hacker” to siphon off some US$50m worth of invested funds.231 But if the “entire contracts
clause” found on the DAO website232 is to be taken seriously, then it is arguable that the “hack”
was perfectly legal since it was permitted by its code and the code constituted the complete
contract.233 There are frequent references to the concept that “code is law” – a concept that has
lost its original meaning (i.e. code regulates behaviour more effectively than legal rules)234 and
became a “suitcase expression” carrying different connotations depending on the context.
Exceptional circumstances apart, it is generally unreasonable to expect that parties would agree
to be bound by code alone – especially if they cannot “read” code and hence understand or
predict how it will execute.
Thirdly, in order for a “smart contract” to perform the contract, it must have access to
the means of performance, i.e. the asset to be transferred, when the contractual conditions are
met. However, the only way to guarantee such performance at the time of contracting is to
ensure that the “smart contract” has access to such assets as are necessary for performance at
the outset. Furthermore, “smart contracts” can ensure performance only if such performance
226
But see also text accompanying nn. 172-189.
227
Above n. 207 at p. 420.
228
J. Sklaroff, “Smart Contracts and the Cost of Inflexibility” (2017) 166 Univ. Penn. L. Rev. 263.
229
C. Metz, “The Biggest Crowdfunding Project Ever – the DAO – is Kind of a Mess”, Wired (6 June 2016).
230
For an etymology of the word “bug”, see Minasi, above n. 213 at pp. 24-26.
231
K. Finley, “A $50 Million Hack Just Showed that the DAO was all too Human” Wired (18 June 2016).
232
Although the terms have now been deleted from the DAO website, they can be found on Reddit:
www.reddit.com/r/ethereum/comments/4oiqj7/critical_update_re_dao_vulnerability/d4cy4v0/ (accessed 6
December 2018).
233
J. Dietz, “DAOs, Hacks and the Law” Medium (18 July 2016) at https://medium.com/@Swarm/daoshacks-
and-the-law-eb6a33808e3e (accessed 6 December 2018).
234
L. Lessig, Code, Version 2.0 (New York: Basic Books, 2016).
28
235
See text accompanying nn. 121-171.
236
I. Nikolic et al., “Finding the Greedy, Prodigal, and Suicidal Contracts at Scale” (2018)
https://arxiv.org/pdf/1802.06038.pdf (last accessed 1 August 2018) p 5
237
For an anthropological account of credit as well as both the good and evil it has wrought, see D. Graeber, Debt:
The First 5,000 Years (New York: Melville House, 2011). Cf. Sir K. Cork et al, Report of the Review Committee
on Insolvency Law and Practice (1982) Cmnd 8558, Chapter 1, pp. 9-13.
238
Cf. Y.N. Harari, Sapiens: A Brief History of Humankind (New York: HarperCollins, 2015), at pp. 305-333.
239
See text accompanying nn. 1-11.
240
Above n. 198, at 270.
241
Mik, above n. 199, at p. 296.
242
See M. P. Gergen, “The Use of Open Terms in Contract” (1992) 92 Col L Rev 997.
243
Mik, above n. 199, at p. 294; K. E.C. Levy, ‘Book-Smart, Not Street-Smart: Blockchain-Based Smart Contracts
and The Social Workings of Law’ (2017) 3 Engaging Science, Technology, and Society 10 at 11.
29
The difficulties of coding are also severely underrated, especially given the number of
novice coders with rudimentary technical skills245 that have been attracted by the blockchain’s
libertarian promises. The process of coding is highly exacting 246 as it entails formulating
precise instructions that describe how to complete a particular task while anticipating all
possible variations in conditions that might affect its operation. 247 In coding, there is no
officious bystander to add lines of code that go without saying248 or reinterpret code that must
have gone awry.249 Coding has been likened to “writing War and Peace – but with no typos.”250
Unfortunately, “[i]ndustry average experience is about 1-25 errors per 1000 lines of code for
delivered software.”251 The industry average for “smart contracts” on the ethereum network,
the most popular blockchain hosting “smart contracts”, is dramatically worse at more than 100
bugs per 1000 lines of code.252 Nor do bugs simply increase in number proportionally to the
length of the code. Although it might be thought that code that is twice as large would contain
twice as many bugs, in fact, “the density of defects – the number of defects per 1000 lines of
codes – increases.”253 Simply put, doubling the number of lines of code will likely more than
double the number of bugs in the code.254
Once the difficulties of expressing obligations in code and creating error-free code are
properly understood, and the realities of commercial negotiation fully appreciated, the true
impact of “smart contracts” on the legal profession can be more firmly grasped. “Smart
contracts” will not solve many of the problems arising out of commercial contracts. They can
only “solve” some problems by creating others. Instead of promisees having to enforce
promises against promisors, promisors will have to take action to try to reverse “self-executing”
performance triggered by bugs in the code or inaccurate information supplied by oracles. In
most cases, “smart contracts”, if at all useful, are better utilised to automate certain aspects
only (i.e. specific clauses or obligations) of a contract drafted properly in natural language. The
sparing use of code will limit the number of bugs and the underlying legal contract can provide
a safety net for the inevitable residual bugs. The expense involved in creating such “smart
clauses” also suggest that they will only be cost-effective where a standard form will eventually
be used in scale, such as the automation of compensation for flight delays in order to save costs
244
C. Jones, Estimating Software Costs (2nd Ed, New York: McGraw-Hill, 2012), at p. 450.
245
See generally: F. Al Khalil et al., “Trust in Smart Contracts is a Process, As Well” In: Brenner M. et al. (eds)
Financial Cryptography and Data Security, Lecture Notes in Computer Science, vol 10323 (New York: Springer,
2017).
246
Above n. 244 at p. 444.
247
A rudimentary exercise anyone with no coding experience can try which demonstrates the difficulties with
coding can be found above, n. 230, at pp. 26-27.
248
Shirlaw v Southern Foundries (1926) Ltd. [1939] 2 K.B. 206 at p. 227 (MacKinnon LJ).
249
Investors Compensation Scheme Ltd. v West Bromwich Building Society [1998] 1 WLR 896 at p. 913 (Lord
Hoffmann) Cf. Above n. 227 at p. 444.
250
Above, n. 230, at p. 27.
251
S. McConnell, Code Complete, 2nd Edition (Washington: Microsoft Press, 2004) at p. 521. See also Minasi,
above n. 213, for a scathing critique on the software industry’s attitude towards bugs.
252
P. Vessenes. “Ethereum Contracts Are Going To Be Candy For Hackers”, Blockchain, Bitcoin and Business
(18 May 2016) at https://vessenes.com/ethereum-contracts-are-going-to-be-candy-for-hackers/ (accessed 6
December 2018).
253
Above n. 251 at p. 652.
254
Above n. 251, Table 27-1, at p. 652.
30
V. CONCLUSION
255
See, e.g., Axa’s Fizzy https://www.axa.com/en/newsroom/news/axa-goes-blockchain-with-fizzy. But note that
the claims by the vendor that the platform is 100% secure should not be taken seriously and must be taken as pure
puff and read in light of all the limitations enumerated in this paper. It is notable that all of this automation could
have been achieved without the blockchain, just without the attendant fanfare and hyperbole and it is probably the
case that there has simply been insufficient demand for such an industry to grow.
256
Cf. above n. 244 at p. at 446.
257
Consider Japan’s experience in regulating cryptocurrency exchanges following the disastrous Mt Gox hack of
2014. On 26 January 2018, yet another Japanese cryptocurrency exchange, Coincheck, one licensed under the
new regime, suffered an even worse hack, leaving Japan with the dubious honour of having suffered the two worst
crypto-asset hacks in the history of the asset class. See L. Lewis and R. Harding, “‘Crypto crazy’ Japanese
mystified by virtual heist”, Financial Times (3 February 2018). For a legal analysis of the Tokyo District Court’s
decision in the Mt Gox insolvency, see Low and Wu, above n. 88, and Takahashi, above n. 88.
258
C. Kim, “Sweden’s Land Registry Demos Live Transaction on a Blockchain”, Coindesk (15 Jun 2018) at
https://www.coindesk.com/sweden-demos-live-land-registry-transaction-on-a-blockchain (accessed 1 March
2019).
259
Reuters, “ASX delays blockchain transition by six months”, The Sydney Morning Herald (4 September 2018).
260
Many blockchain projects are quickly abandoned and never proceed past the pilot stage. See, e.g., in the context
of international development, the devastating report by J. Burg, C. Murphy, and J.P. Pétraud, “Blockchain for
International Development: Using a Learning Agenda to Address Knowledge Gaps”, MERLTech (29 November
2018) at http://merltech.org/blockchain-for-international-development-using-a-learning-agenda-to-address-
knowledge-gaps/ (accessed 6 December 2018). Cf. L. Mearian, “Blockchain: What’s it good for? Absolutely
nothing, report finds”, Computerworld (5 December 2018). In 2017, Deloitte reported that only 8 percent of
blockchain projects of 86,034 blockchain projects on GitHub were active, despite a relatively lenient definition
of active to mean being updated at least once in the last 6 months: see J. L. Trujillo, S. Fromhart and V. Srinivas,
“Evolution of Blockchain Technology: Insights from the GitHub Platform”, Deloitte Insights at
https://www2.deloitte.com/insights/us/en/industry/financial-services/evolution-of-blockchain-github-
platform.html (accessed 1 March 2019).
261
The Law Commission Annual Report 2017-18 (Law Com No 379) (19 July 2018) at 10.
262
But it is notable that the Chancellor of the Exchequer believes that the blockchain can resolve problems with
the Irish border post-Brexit: see D. McCum and J. Kelly, “Chancellor’s blockchain idea is a desperate scrape of
the Brexit barrel”, FT Alphaville (2 October 2018).
263
E-mail was widely used within a year or two of Arpanet’s (a precursor of the Internet) deployment: see K.
Hafner and M. Lyon, Where Wizards Stay Up Late: The Origins of the Internet (New York: Simon & Schuster,
1996) at pp. 160-218. Soon after the various localised networks such as Arpanet were connected to one another
31
in the mid to late 1980s, the world wide web was soon born and proliferated rapidly: see T. Berners-Lee, Weaving
the Web: The Past, Present and Future of the World Wide Web by its Inventor (London: Orion Business Books,
1999); J. Gillies and R. Cailliau, How the Web was Born: The Story of the World Wide Web (Oxford: OUP, 2000).
32