marketing

Marketing materials (presentations, posters, flyers)
Log | Files | Refs

privacy.tex (45971B)


      1 \documentclass{article}
      2 
      3 \usepackage{url}
      4 \usepackage{enumitem}
      5 \usepackage{authblk}
      6 
      7 \title{Cental Bank Accounts are Dangerous and Unnecessary \\ A critique of two
      8   papers\footnote{We thank Martin Summer for encouraging us to put our
      9   critique of the ECB's report in writing.  We thank central bankers for their
     10   good aspirations, which they should keep up even if we question their
     11   universal realization.}}
     12 
     13 \author[$\triangle\pounds$]{Antoine~d'Aligny}
     14 \author[$\triangle$]{Emmanuel~Benoist}
     15 \author[$\dagger\heartsuit$]{Florian~Dold}
     16 \author[$\triangle\dagger\heartsuit$]{Christian~Grothoff}
     17 \author[$\S$]{\"Ozg\"ur~Kesim}
     18 \author[$\ddagger\heartsuit$]{Martin~Schanzenbach}
     19 \affil[$\triangle$]{Bern University of Applied Sciences}
     20 \affil[$\pounds$]{École d'Ingénieurs Généraliste du Numérique}
     21 \affil[$\dagger$]{Taler Systems SA}
     22 \affil[$\S$]{Freie Universit\"at Berlin}
     23 \affil[$\ddagger$]{Fraunhofer Institute for Applied and Integrated Security}
     24 \affil[$\heartsuit$]{The GNU Project}
     25 \date{\today}
     26 \begin{document}
     27 
     28 \maketitle
     29 
     30 \abstract{
     31 In December 2021 the European Central Bank (ECB) published a report on ``Central Bank Digital
     32 Currency: functional scope, pricing and controls'' in its Occasional Paper
     33 Series~\cite{ecb2021}, detailing various challenges for the
     34 Digital Euro.  While the authors peripherally acknowledge the existence of
     35 token-based payment systems, the notion that a Digital Euro will somehow
     36 require citizens to have some kind of central bank account is pervasive in the
     37 paper. We argue that an account-based design cannot meet the ECB's stated
     38 design goals and that the ECB needs to fundamentally change its mindset when
     39 thinking about its role in the context of the Digital Euro if it wants the
     40 project to succeed.
     41 
     42 Along the same lines, the French National Council for Digitalization published
     43 a report on ``Notes and Tokens, The New Competition of
     44 Currencies''~\cite{french2021}.  Here, the authors make related incorrect
     45 claims about inevitable properties of Central Bank Digital Currencies
     46 (CBDCs), going as far as stating that a CBDC is not possible without an eID
     47 system.  Our paper sets the record straight.
     48 
     49 % [oec] Shouldn't we also mention GNU Taler already here as an example for an alternative?
     50 
     51 \noindent
     52 {\bf JEL Classification Codes:} E42, E58 \\
     53 {\bf Keywords: } retail CBDC, privacy, crypto-currency, trust
     54 
     55 
     56 \section{Introduction}
     57 \label{sec:intro}
     58 
     59 This article presents our comments regarding two papers that have been written
     60 by the European Central Bank (ECB)~\cite{ecb2021} and the French National
     61 Council for Digitalization\footnote{Conseil national du numérique}
     62 (CNNum)~\cite{french2021}.  As the French report is using some rather unclear
     63 definitions of currency and crypto-currency, we will begin with a brief
     64 introduction of terms and technologies.
     65 
     66 We will then explain why the ECB should not be the only guardian of the
     67 privacy of the European citizen and why coupling of a Central Bank Digital
     68 Currency (CBDC) with an identity system is a bad idea. We address a question
     69 raised in the ECB's report on the risks of a retail CBDCs promoting
     70 disintermediation to a degree that might threaten traditional banks.
     71 
     72 The second part of this paper proposes a set of design principles that any
     73 retail CBDC must integrate.  We then argue that a retail CBDC based on GNU
     74 Taler would not only satisfy these principles, but also could provide an added
     75 value over existing commercial solutions for a retail CBDC.  Finally, we
     76 explain how tokenization can help to build an eGold payment system or a system
     77 allowing micropayments in Bitcoins and Ethereum.
     78 
     79 
     80 \section{Currency, crypto-currency and payment systems} \label{sec:terms}
     81 
     82 Currency is ``something that is used as a medium of exchange;
     83   money.''\cite{dictionaryCurrency}. From the French dictionary, currency
     84 (i.e. la monnaie) is an ``Instrument of measurement and conservation of
     85   value, legal means of exchanging goods''\footnote{Instrument de mesure et
     86   de conservation de la valeur, moyen légal d'échange des biens.}, or
     87 ``Unit of value accepted and used in a country, a group of
     88   countries.''\footnote{Unité de valeur admise et utilisée dans un pays, un
     89   ensemble de pays.}~\cite{LeRobertMonnaie}
     90 The main desired properties of a currency are therefore: conservation of value and
     91 availability for exchange.
     92 
     93 For more than a hundred years, most currencies were issued by central banks.
     94 Over the last decade a large number of new crypto-currencies have appeared,
     95 and these currencies are not tied to any central bank. The first and best
     96 known of them is Bitcoin~\cite{nakamoto2008re}. The various crypto-currencies
     97 are very heterogeneous and based on different principles. Some use accounts
     98 with balances with a blockchain used to establish a consensus on the account
     99 balances (Bitcoin was the first currency to use it), while others allow the
    100 transfer of fungible tokens that are disassociated from any transaction
    101 history (Zcash~\cite{zcash}).  Among those using a blockchain, some use proof
    102 of work (Bitcoin, Ethereum), others use proof of stake
    103 (Ethereum, expected in Q2 2022~\cite{merge2022,nelson2021}) or most recently
    104 proof of wasted human lifetime (Play to Earn~\cite{p2e2022}). Some are rather
    105 transparent (Bitcoin, Ethereum), while others allow private transactions
    106 (Monero~\cite{noether2015ring}).
    107 
    108 Crypto-currencies do not have a central bank controlling the rules governing
    109 the currency. Instead, software developers program rules into algorithms. New
    110 rules are adopted if they find the consensus of the ``miners'' (for
    111 crypto-currencies using proof of work) or ``stakeholders'' (for
    112 crypto-currencies using proof of stake).  In general, the rules are written to
    113 produce some artificial scarcity of the currency minted according to the
    114 rules, so as to convince hoarders of the value of their limited-edition
    115 bitstrings.  A key design challenge is thus to provide ample rewards to
    116 ``miners'' and ``stakeholders'' that facilitate transactions while maintaining
    117 a limited supply.
    118 
    119 Crypto-currencies are beginning to gain functionalities through the addition
    120 of payment systems on top of these basic currency mechanisms.  In general, any
    121 payment system enables participants to make financial transactions, but does
    122 not in itself establish a new currency. Compared to the transaction mechanisms
    123 offered by the underlying currency, payment systems can provide credit, make
    124 transactions faster, cheaper, more private or more usable. Payment systems may
    125 require their users to trust payment system providers, as these intermediaries
    126 may introduce new failure modes into the system. As a result, payment service
    127 providers are generally regulated entities, at least when they deal with
    128 traditional fiat currencies. Examples for payment systems used with
    129 crypto-currencies include the various proprietary crypto-trading platforms as
    130 well as distributed layer-2 solutions like the Lightning
    131 network~\cite{lightening}.
    132 
    133 There are two types of CBDCs, retail CBDCs and
    134 wholesale CBDCs. Wholesale CBDC is expected to be primarily used to trade
    135 between banks and between the central bank and banks. An example of wholesale
    136 CBDC can be found in the description of the project Helvetia of the Swiss
    137 National Bank~\cite{BISHelvetia2020}.\footnote{We note that the French report
    138   confuses project Helvetia (which implements a wholesale CBDC) with an
    139   entirely different proposal~\cite{chaum2021} for a retail CBDC.}  In
    140 contrast, a retail CBDC is intended to be used by citizens and businesses in
    141 their daily lives for their ordinary expenses, basically providing a form of
    142 digital cash that is, like physical cash, a liability of the central bank.
    143 This paper is about retail CBDCs.  Our discussion will
    144 assume that the currency for the CBDC already exists, and thus focus on the
    145 requirements for the payment system that facilitates ordinary people to make
    146 digital transactions with such a currency.
    147 
    148 
    149 \section{Central Banks cannot be the Guardian of Privacy}
    150 \label{sec:guardians}
    151 
    152 The ECB's report starts with a public interest-oriented self-image of central
    153 banks. For example, the authors claim that ``central banks operate in the
    154 interest of society, setting goals in the public interest rather than private
    155 interest'' and ``as public and independent institutions, central banks have no
    156 interest in monetising users' payment data.  They would only process such data
    157 to the extent necessary for performing their functions and in full compliance
    158 with public interest objectives and legislation.'' While this is a laudable
    159 aspiration, it is a false statement: The Bank of Greece, one of the central
    160 banks of the Eurosystem, is dominantly privately held and listed on the Athen's
    161 stock exchange~\cite{BG2016}.  Similar constructions with privately owned
    162 central banks exist outside of the Eurozone, for example with the Swiss
    163 National Bank~\cite{SNB}.  That all central banks are independent and operate
    164 in the public interest is sometimes questioned in the popular
    165 press~\cite{tcimer2020}.  With counter-examples inside the
    166 European System of Central Banks (ECBS) itself and within Europe, it is clear
    167 one needs to be careful to avoid confusing the idealistic view of central
    168 banks as politically neutral and public-minded institutions with reality.
    169 To build secure systems, it is best to assume that all parties,
    170 including the system's designers, implementors and main operators
    171 themselves, could be malicious.
    172 
    173 Central banks thus need to take a different mindset, and idally picture
    174 themeselves as malicious actors when working on the design of a CBDC.  Only
    175 this way, they will avoid designs which would entrust them with information
    176 and decisions that they must not be entrusted with.  For example, the ECB's
    177 report currently suggests that the ECB ``may also prefer the (...) the ability
    178 to control the privacy of payments data''. This is a fundamental misconception
    179 of the notion of privacy. Citizens will \emph{only} have privacy with a
    180 Digital Euro if they themselves have control over their payment data. Privacy
    181 and the human right of informational self-determination requires that each
    182 (legally capable) citizen is in control of their personal data.  A central
    183 bank asserting the ``ability to control the privacy'' is thus an oxymoron:
    184 once anyone else has control, citizens have no privacy.  Public institutions
    185 that act in the public interest must acknowledge this to not patronize their
    186 sovereign: the citizens.
    187 
    188 The French report~\cite{french2021} correctly states that a Digital Euro based
    189 on accounts poses ``democratic risks''\footnote{risques démocratiques} and could allow ``state surveillance of
    190 all transactions of every individual''\footnote{surveillance de toutes les transactions de chaque individu par l’État}.
    191 Subsequently the wording of the French report is misleading, as it turns the
    192 possibility of privacy-invasive monitoring into a mandatory feature of any
    193 CBDC, which is demonstrably false: There are many digital currencies and
    194 payment systems that do not allow comprehensive
    195 surveillance~\cite{monero,dold2019}.  Thus, it is wrong for the authors of the
    196 French report to take a possible design choice of an account-based system as a
    197 necessity, for example when they write that ``the centralization and data
    198 tracking of CBDC projects leads to a loss of privacy
    199 that coupled with the programmability of the currency can have serious
    200 consequences.''\footnote{Toutefois, la centralisation et la traçabilité des données des projets de monnaie numérique de banque centrale conduit à une perte de vie privée qui, associée à la programmabilité de la monnaie, peut avoir de lourdes conséquences. }  Using the indicative here is a serious mistake, as it is
    201 understood that any CBDC design would necessarily lead to a loss of privacy,
    202 when this is false.
    203 
    204 Furthermore, the use of the term ``surveillance'' in the French report actually
    205 understates the negative impact of an account-based CBDC, as with an
    206 account-based CBDC the central bank would likely also be in a position to
    207 prevent individuals from spending money and to manipulate their balances,
    208 thereby gaining comprehensive power over the economic activities of
    209 individuals going far beyond mere analytical capabilities. The use of
    210 permissioned blockchains does not inherently prevent such manipulations as
    211 long as the participating operators are colluding.  Thus, if European
    212 democratic ideals and personal freedoms are to prevail, we clearly cannot
    213 ignore this danger and must reestablish the principles of personal
    214 responsibility, personal independence and subsidiarity in the design processes
    215 for critical infrastructure created by European institutions.
    216 
    217 Since this conjecture is taken as fact while counterexamples
    218 exists, the conclusion of the first part of the French report follows a
    219 logical fallacy.  The authors assert that ``the new properties of CBDC raise
    220 political questions''\footnote{``Dans un contexte où les nombreux projets d’émettre
    221 des monnaies numériques viennent étendre le rôle des banques
    222 centrales se pose la question des enjeux démocratiques et politiques de
    223 ces nouveaux attributs.''} which implies that the deployment of a CBDC would be
    224 impossible in the current state.  But adaptations of central bank missions to
    225 include ``absolute control over the rules and regulations of the use'' of
    226 money via the issuance of a CBDC (as envisioned by Agustín Carstens of the
    227 Bank for International Settlements\footnote{See speech given on October 19th 
    228 2020 on ``Cross-Border Payment -- A vision for the future'', 
    229 \url{https://meetings.imf.org/en/2020/Annual/Schedule/2020/10/19/imf-cross-border-payments-a-vision-for-the-future} 
    230 at 00:24:30}) are dangerous
    231 if the central bank can choose to void privacy assurances. Carstens correctly states
    232 that with the proposed CBDC design the central bank would have the ability to know about every
    233 payment. Consequently, the central bank would be able to strictly enforce
    234 its rules and regulations, which implies the bank could arbitrarily block
    235 payments by private citizens. The repressive potential of a government with
    236 such a capability is so large that it must be firmly rejected.
    237 
    238 \section{Harmful coupling with identity}
    239 \label{sec:coupling}
    240 
    241 The risk is not theoretical. The Emergencies Act of February 2022 granted the
    242 Canadian executive the right to freeze bank accounts without judicial
    243 oversight.  The Canadian minister of justice David Lametti promptly used this
    244 to threaten people on CTV News with extrajudicial asset freezes if they were
    245 making significant financial contributions to a political cause he strongly
    246 disagrees with.\footnote{\url{https://www.youtube.com/watch?v=xoTCxWSQW30}} If
    247 this is possible in Canada today, we do not want to imagine what might happen
    248 in less established democracies if an account-based CBDC were to largely
    249 displace cash.
    250 
    251 Consequently, the question should be if central banks should limit CBDC
    252 issuance within the scope of their current mission instead of modifying their
    253 rulebooks.  Wisely, the US Federal Reserve is currently barred from
    254 maintaining digital account balances for individuals~\cite{usfed2022}.  We
    255 consider this law wise, as we argue that tightly coupling payments with
    256 identity is harmful.  While the law prevents the Federal Reserve's from
    257 issuing an account-based retail CBDC, it does not seem to prevent the Federal
    258 Reserve from issuing a token-based privacy-respecting CBDC.  This is crucial,
    259 as the technology behind token-based privacy-respecting CBDCs would
    260 fundamentally not support the kind of asset freezes enabled by the Canadian
    261 Emergencies Act.
    262 
    263 In contrast, ECB report suggests that ``combining use of digital identity and
    264 CBDC'' might be beneficial. The same idea is echoed in the French report which
    265 quotes an unpublished report from Catenae (2020) to say that ``it is difficult
    266 to envisage the creation of a retail CBDC, and more specifically a Digital
    267 Euro without first creating a reliable, secure digital identity offering the
    268 necessary guarantees''\footnote{il est difficile d'envisager la création d'une
    269 monnaie numérique de banque centrale de détail, et plus particulièrement d’un
    270 ``euro numérique'', sans création préalable d'une identité numérique fiable,
    271 s\'ecuris\'ee et offrant les garanties nécessaires}. From a technical
    272 perspective, the statement is hard to defend since current cryptocurrencies
    273 work perfectly well without depending on a ``trusted digital identity''.
    274 
    275 From a regulatory perspective, it is understood that institutions working with
    276 a Digital Euro will at times be legally required to establish the identity of
    277 actors. However, when a Digital Euro needs a digital identity for some of the
    278 actors in the digital currency production chain, one can use existing
    279 Know-Your-Customer (KYC) processes of commercial banks or use certificates
    280 based on the already widely used X.509 standard, which are both already in
    281 common use on the Internet.\footnote{They correspond to the ``s'' in
    282 ``https'', for example.}  While we can imagine a world in which a new
    283 ``trusted digital identity'' exists, and develop new protocols for this world,
    284 this is by no means a prerequisite to any work on a Digital Euro.  Waiting for
    285 the creation of a new trusted digital identity at the European level before
    286 creating a CBDC may be equivalent to postponing the decision indefinitely, and
    287 the necessity of first deploying a new electronic identity scheme is not shown
    288 by the authors.
    289 
    290 What neither report appreciates is that combining payments with such a digital
    291 identity system would create a serious liability.  Even if central banks were
    292 neutral custodians of citizens' privacy (see Section~\ref{sec:guardians}), the
    293 problem is the data itself.  As Bruce Schneier has concisely argued already in 2016:
    294 ``Data is a toxic asset.  We need to start thinking about it as such, and treat
    295 it as we would any other source of toxicity. To do anything else is to risk our
    296 security and privacy.''~\cite{schneier2016toxic}
    297 Despite this well-established insight, the ECB report is insinuating to link
    298 identities with payments which consequently and inevitably produces highly
    299 sensitive\footnote{Or to stick with Schneier's analogy, ``super-toxic''}
    300 metadata.  Referring to the toxicity of this metadata, Edward Snowden famously
    301 said at IETF 93 in 2019
    302 that \begin{quote} ``(...) we need to get away from true-name payments on the
    303   Internet.  The credit card payment system is one of the worst things that
    304   happened for the user, in terms of being able to divorce their access from
    305   their identity.''
    306 \end{quote}
    307 If the European Union wants to avoid a dystopia of the transparent citizen
    308 and catastrophic cases of personal data theft, it must enable citizens to put a
    309 firewall between their identity and their payments.
    310 
    311 Citizens themselves are well aware of this aspect and it consequently would
    312 have a significant impact on acceptance of a CDBC: The Swiss population
    313 recently rejected a proposal for a national eID~\cite{eid2021}, and the newly
    314 elected German government is promising a reversal of ubiquitous data retention
    315 (without cause)~\cite{koalitionsvertrag2021}.  The European Parliament has
    316 members proposing to ban the use of facial recognition in public
    317 spaces~\cite{euai2021}.  The ECB's proposal seemingly ignores the popular
    318 rejection of treating every citizen as a criminal suspect by doubling down.
    319 The missing link in the ECB proposal that would reveal the dystopic reality
    320 they would invoke would be a statement that facial recognition could be used
    321 to conveniently establish the payer's identity --- or ``pay with your smile'',
    322 as contemporary account-based digital payment offerings already put it.  We
    323 stress that CBDC payment data, like other payment data, can be expected to be
    324 retained for 6 or more years~\cite{fca}.  If CBDC payment data is additionally
    325 strongly coupled with our identities, those who dislike living in a panopticon
    326 could only hope for such a CBDC to be rarely used.
    327 
    328 
    329 
    330 \section{Addressing Balance Sheet Disintermediation via Self-Custody}
    331 \label{sec:disintermediation}
    332 
    333 The ECB report describes the risk of (commercial) bank balance sheet
    334 disintermediation as one of the major risks to consider from the introduction
    335 of a CBDC.  Basically, the risk is that consumers losing faith in a
    336 commercial bank may shift funds into CBDC, thereby exacerbating the situation
    337 by creating a ``bank run''.
    338 The ECB report discusses various strategies, but primarily focuses on limiting
    339 ``hoarding'' of CBDC by imposing a balance limit. They then realize that this
    340 can be quite difficult, as businesses may have varying needs for CBDC, so a
    341 fixed low limit would strangle the utility of the CBDC, while a fixed high
    342 limit may not be effective. They then propose a dynamic limit which they would
    343 ``calculate in accordance to (...) presumed cash needs''.
    344 
    345 Here, the authors might want to review some of the hard lessons from the
    346 introduction of $CO_2$ emissions certificates, where initial allocations were
    347 calculated based on ``presumed emission needs'' of certain industries,
    348 resulting in windfalls for shifty polluters that managed to rig the
    349 calculations, giving them excess certificates that they could then
    350 resell.~\cite{carbon} If CBDC holdings are limited and financially attractive,
    351 there will clearly again be businesses profiting from organizing their
    352 business data to obtain high account limits.  This kind of socially
    353 unproductive optimization will happen regardless of the specific rules that
    354 the ECB will design.  Thus, this is a fundamentally flawed design.
    355 
    356 
    357 The ECB's focus on account-based solutions seems to have caused it to ignore a
    358 better solution that was proposed in~\cite{snb2021}, even though it was
    359 clearly on the table: When justifying the need to control hoarding of CBDC,
    360 the authors write that ``risk-free assets have a negative yield (apart from
    361 banknotes, which are costly and risky to store in large amounts)''.  Here,
    362 they presume that hoarding CBDC must be risk-free. However, with Digital Euros
    363 represented as tokens that citizens hold in self-custody, the CBDC would not
    364 be risk-free: citizens would have to safeguard their digital devices (both
    365 physically and against malware). Owners of cryptocurrencies are very familiar
    366 with the fact that self-custody is risky~\cite{hacks1,hacks2}.  Thus, a CBDC
    367 design using digital tokens under the control of citizens indirectly provides a
    368 good solution for hoarding, as self-custody of the digital assets entails a
    369 risk, quite comparable to the risk of hoarding cash. By analyzing this risk,
    370 citizens and businesses would themselves determine appropriate individual
    371 limits for their CBDC holdings based on their actual cash needs.
    372 
    373 
    374 \section{Design principles for CBDCs}
    375 
    376 We think that any CBDC must be based on the following design principles
    377 inspired by~\cite{dold2019}, given in order of priority:
    378 
    379 \begin{enumerate}
    380   \item \textbf{A CBDC must be implemented as Free Software.}
    381 
    382     Free refers to ``free as in free speech'', as opposed to ``free as in free beer''.
    383     More specifically, the four essential freedoms of free software
    384     \cite{stallman2002essays} must be respected, namely users must have the
    385     freedom to (1) run the software, (2) study and modify it, (3) redistribute
    386     copies, and (4) distribute copies of the modified version.
    387 
    388     This prevents vendor lock-in, as another software provider can
    389     take over, should the current one provide inadequate quality of service.
    390     Only Free Software can be seen as truly respecting the sovereignty of
    391     citizens using the software, as well as countries relying on it.
    392     As the ECB report states, international or even cross-border use of a
    393     CBDC may be desireable, but this excludes solutions that would be under
    394     the control of one nation unless we presume that nations will be willing
    395     to subject critical infrastructure to the whims of other nations.
    396     Recent attacks by the US government against Huawei effectively limited
    397     Huawei's ability to use US software~\cite{huawei}. Such political games
    398     can cause significant suffering for the population when they impact
    399     critical infrastructure. It is thus clear that
    400     only domestic or Free Software is acceptable for critical infrastructure of sovereign
    401     countries.  Cross-border payments using the same payment system
    402     require at least one country to use
    403     non-domestic software.  Thus, only with Free Software all countries and
    404     organizations can run the payment system without the risk of being controlled by
    405     foreign entities.  Customers benefit from this freedom, as the wallet
    406     software can be made to run on a variety of platforms, and user-hostile
    407     features such as tracking or telemetry could easily be removed from
    408     wallet software.
    409 
    410     This rules out the mandatory usage of specialized
    411     hardware such as smart cards or other hardware security modules, as the
    412     software they run cannot be modified by the user.  These components can,
    413     however, be voluntarily used by merchants, customers or payment processors
    414     to increase their operational security.
    415 
    416   \item \textbf{A CBDC must protect the privacy of buyers.}\label{item:privacy}
    417     % FIXME: I'd suggest a comma after 'possible',
    418     % otherwise 'possible' might be understood as
    419     % a adjective for 'privacy'.
    420     Where possible, privacy should be guaranteed via technical measures as opposed to mere
    421     organizational policies.  Especially with micropayments for online content, a
    422     disproportionate amount of rather private data about buyers would be revealed, if
    423     the payment system does not have privacy protections.
    424 
    425     In legislations with data protection regulations (such as the recently introduced GDPR in Europe~\cite{voigt2017eu}),
    426     merchants benefit from this as well, as no data breach of customers can happen if this information
    427     is, by design, not collected in the first place.  Obviously some private data, such as the shipping
    428     address for a physical delivery, must still be collected according to business needs.
    429 
    430     The security of the payment systems also benefits from this, as the model
    431     shifts from authentication of customers to mere authorization of payments.
    432     This approach rules out whole classes of attacks such as phishing~\cite{garera2007framework} or credit
    433     card fraud~\cite{sahin2010overview}.
    434 
    435   \item \textbf{A CBDC must enable the state to tax income and crack down on
    436     illegal business activities.}
    437 
    438     Naturally, a central bank cannot deploy a payment system that does not
    439     meet broadly accepted rules and regulations for payment systems. While
    440     it is conceivable that specific rules and regulations may be modified to
    441     accomodate a CBDC, it is inconceivable that states would relax the rules
    442     to the point where businesses receiving income are not held accountable
    443     for their actions, especially as there seems to be a broad consensus that
    444     levying of taxes based on economic activity is beneficial to society.
    445 
    446   \item \textbf{A CBDC must prevent payment fraud.}
    447 
    448     This imposes requirements on the security of the system, as well as on the
    449     general design, as payment fraud can also happen through misleading user
    450     interface design or the lack of cryptographic evidence for certain
    451     processes.
    452 
    453   \item \textbf{A CBDC must only disclose the minimal amount of information
    454     necessary.}
    455 
    456     The reason behind this goal is similar to (\ref{item:privacy}).  The
    457     privacy of buyers is given priority, but other parties such as merchants
    458     still benefit from it, for example, by keeping details about the merchant's financials
    459     hidden from competitors.  Similarly, the central bank should not know
    460     all the details of say the contract between a merchant and a consumer, and
    461     only learn the amount transacted. Other state agencies, such as the tax
    462     office during a tax audit, may be able to compell merchants to disclose
    463     additional information, but again always only the minimal amount necessary
    464     for the specific function.
    465 
    466   \item \textbf{A CBDC must be usable.}
    467 
    468     Specifically it must be usable for non-expert customers, such as children.
    469     We note that account-based payments are generally not accessible to
    470     children, as they are often unable to open a regular bank account under
    471     current rules.  This alone is a good reason for a CBDC to not be
    472     account-based! Usability also
    473     applies to the integration with merchants, and informs choices about the
    474     architecture, such as encapsulating procedures that require cryptographic
    475     operations into an isolated component with a simple API.
    476 
    477   \item \textbf{A CBDC must be efficient.}
    478 
    479     Approaches such as proof of work are ruled out by this requirement.  Efficiency is
    480     necessary for a CBDC to scale to the hundreds of thousands of transactions
    481     required to support larger economic areas. Efficient payments can also open
    482     up new use-cases by enabling micropayments.
    483 
    484   \item \textbf{A CBDC must avoid single points of failure.}
    485 
    486     While a central bank is itself kind-of a single point of failure and inherent
    487     in a CBDC, the technical deployment should avoid single
    488     points of failure.  This manifests in architectural choices such as
    489     the isolation of certain components, and auditing procedures.
    490 
    491   \item \textbf{A CBDC must foster competition.}
    492 
    493     It must be relatively easy for various commercial businesses to operate
    494     components of the overall payment system.  While the
    495     barriers for this in traditional financial systems are rather high, the
    496     technical burden for new operators to join must be minimized. Operators
    497     may incluce licensed entities such as banks (for operations that are closely
    498     related to the payment processing), but also unlicensed entities can partake
    499     in activities such as enabling backups or integrating payment services at
    500     retailers.  A design choice that supports this is to split the whole system into smaller
    501     components with well-defined protocols between them, such that the various
    502     components can be operated, developed and improved upon independently,
    503     instead of having one completely monolithic system.
    504 
    505 \end{enumerate}
    506 
    507 In our opinion, any candidate for CBDC must follow at least those principles
    508 to be trustworthy and successful.
    509 
    510 A cross-cutting concern here is that when achieving the security goals, the
    511 CBDC must never rely on the central bank being trustworthy. Good security
    512 designs always strive to avoid trusted parties. This implies that neither the
    513 correctness nor the privacy assurances must rely on an honest central bank.
    514 This false sense of security also became evident when the former director of
    515 the NSA (DIRNSA) revealed his belief that with respect to control over the
    516 toxic data assets accumulated by the NSA ``nobody comes after us''~\cite[page
    517   6f]{cwps}, suggesting that the (by the DIRNSA clearly presumed trustworthy)
    518 US government would never fall. The assumption turned deadly when the Taliban
    519 took over personal profiles including biometric data of Afgahnis that had
    520 collaborated with NATO forces after the retreat of NATO in
    521 2021~\cite{afganistan2021}.  We must not make the same mistake, that is
    522 believing that our institutions are good and eternal, when it comes to our
    523 private payment data. Thus, it is necessary that technical protections for our
    524 privacy are put in place that even the central bank cannot break:
    525 
    526 Privacy is most meaningful when it is guaranteed via technical measures, as
    527 opposed to mere policies. Without a technical layer providing
    528 privacy-by-default, financial transactions reveal unnecessary levels of
    529 personal or private data. This would be especially true if a CBDC became a
    530 ubiquitous payment method. Thus, a CBDC must protect the privacy of buyers and
    531 avoid the use of accounts to avoid facilitating totalitarian control over the
    532 population.  Limited private data, such as the shipping address for a physical
    533 delivery, may need to be collected by merchants (but not the central bank)
    534 according to business needs and protected according to local laws. In this
    535 case, the CBDC must enable deletion of such data as soon as it is no longer
    536 required.
    537 
    538 A possible trap for the design of a privacy-respecting CBDC is central banks
    539 merely delegating responsibility for privacy-sensitive data to commercial
    540 banks.  Such a delegation does not provide adequate protection against state
    541 overreach, as commercial banks still could too easily be compelled to sanction
    542 opposition against the ruling party.  Nevertheless, Auer's
    543 proposal~\cite{bis948} to delegate the technical operation of a CBDC to
    544 tightly supervised commercial banks as an alternative to the central bank
    545 acquiring the technological prowess to centrally operate such a system has
    546 merit: such a delegation can eliminate a likely single point of failure, and
    547 might entice commercial banks to diversify the feature set. It would also give
    548 commercial banks a raison d'être, and thus mitigate the risks from CBDC
    549 disintermediation. In order for commercial banks to make a valuable
    550 contribution when operating the CBDC, we believe the central bank would still
    551 need to set an open standard to ensure interoperability. Strict
    552 cryptographically-enforced privacy-assurances for consumers must be baked into
    553 such a standard.
    554 
    555 \section{GNU Taler}
    556 
    557 We have implemented the GNU Taler token-based payment system based on the
    558 above principles~\cite{dold2019}. GNU Taler offers an alternative to
    559 ID/account-based systems, while still enabling the state to ensure business is
    560 legal (and tax-paying) without infringing on the sovereignty of private
    561 citizens.
    562 
    563 In addition, CBDCs should also provide additional benefits compared to existing
    564 digital payment systems. One of the key questions the ECB report raises is
    565 what it might take for a CBDC to be successful in the market, as the authors
    566 realize that even if a central bank offers a payment system, this does not
    567 assure that the population will adopt it to a meaningful extend.
    568 
    569 So far, we have already given several reasons for adoption, including the use
    570 of Free Software, the protection of privacy, usability and cost-effectiveness.
    571 Furthermore, we believe that a CBDC should also strongly consider the issue of
    572 inclusion, from children to illiterate or innumerate users which are
    573 underserved by contemporary commercial payment solutions.  When it comes to
    574 serving children, age-verification for Websites is a related domain where
    575 digital identity-based solutions are inappropriately pursued today: With
    576 Taler, we can cryptographically extend the principle of strictly protected
    577 privacy also into the domain of age restrictions in
    578 e-commerce~\cite{designagerestriction2021}.  By integrating age restrictions
    579 with privacy-preserving payments, we can enable legal guardians to protect
    580 their wards without contributing to the conversion of sovereign citizens to
    581 digital subjects.  This extension offers benefits for society in multiple
    582 ways: Buyers remain anonymous during payment, yet efficacy of age restriction
    583 is guaranteed.  Anonmyous age restriction during payment simplifies processees
    584 for merchants significantly.  It is based on the principle of subsidiarity and
    585 gives control over age restriction to closest responsible persons (generally
    586 the parents).  And finally, for more than 5 million children in the European
    587 Union between 10 and 18~\cite{EurostatAge10} this would allow participation in
    588 e-commerce more freely.
    589 
    590 Assuming that owners of bank-accounts are mature adults, it allows them to
    591 withdraw age-restricted coins for their wards.  The wards can then anonymously
    592 spend the coins, but transactions will fail at merchants that sell goods with
    593 an age restriction exceeding the age-limit of the coins as specified by the
    594 bank account holder, acting as a guardian.  This design guarantees that the
    595 only information disclosed is that the age-restriction imposed by the merchant
    596 is satisfied - but not the age itself. The payment service provider does not
    597 even learn that age-restrictions are being used, and merchants cannot
    598 distinguish successful purchases by adults from successful purchases by wards
    599 with a sufficiently high age-limit.  Thus, this design offers a clear
    600 alternative to identity-based age-verification that is better aligned with the
    601 principle of subsidiarity which requires that we solve problems at the smallest
    602 unit that can solve them.  And protecting the children should be the task of
    603 their parents. We argue that the ECB should merely give the parents the
    604 technical means to protect their children as they see fit, instead of taking
    605 control.
    606 
    607 
    608 \section{Tokenization beyond CBDC}
    609 \label{sec:tokenization}
    610 
    611 With electronic tokens it is possible to implement payment systems that are
    612 not CBDCs. For example, a Swiss group around Claudio
    613 Zanetti~\footnote{\url{https://www.zanetti.ch/}} is considering launching an
    614 electronic payment system based on gold. Direct payments with physical gold
    615 are problematic, as giving change
    616 is impractical with
    617 gold as is the validation that the gold is pure. With eGold, Zanetti plans to
    618 ``establish a private competitor to the Swiss National Bank, that is not able
    619 to deflate economic crises by inflating the currency at the expense of the
    620 working class''.\footnote{Personal communication.} It remains to be seen if
    621 this effective limitation on central bank policy making is ultimately
    622 beneficial, given the ecological cost of mining gold and the detrimental effect
    623 of rampant economic crises on the poor. Regardless, the idea is interesting as
    624 it may require governments to take a more preventative stance against economic
    625 crises --- and economists (naturally ignoring the global environmental impact
    626 of mining gold) have previously claimed that a competing gold-backed payment
    627 system might be inherently beneficial to the (Swiss) economy~\cite{nzz}.
    628 
    629 Systems like Bitcoin and Ethereum that are based on distributed ledger
    630 technology (DLT) are often confused with true token-based systems. In Bitcoin and
    631 Ethereum funds are still stored in accounts that have a value because of an
    632 incoming transaction, and not because some issuer backs the token.  With the
    633 Depolymerizer~\footnote{\url{https://git.taler.net/depolymerization.git}} we
    634 have created an adapter that allows the tokenization of blockchain-based
    635 cryptocurrencies. Here, the cryptocurrency would be held in escrow by a
    636 trusted third party that backs the tokens representing Bitcoin or
    637 Ether. By reducing the need for on-chain transactions, we expect that a
    638 Depolymerized DLT can in theory scale linearly with the available
    639 computational resources, primarily limited by the much slower transaction rate
    640 of the underlying DLT for inbound and outbound on-chain transactions. The
    641 resulting system would also provide durable transactions within milliseconds,
    642 making cryptocurrency payments significantly more practical. However, like
    643 with e-gold it would do nothing to mitigate the environmental cost of
    644 (cryptocurrency) mining, so fiat currency remains an environmentally
    645 preferable choice.
    646 
    647 For the conversion between fiat currency, e-gold and Depolymerizer-tokenized
    648 cryptocurrencies it is likely that regulated payment service pro\-viders will
    649 be required to perform some kind of KYC procedure to
    650 identify their customers. However, this is no different from identification
    651 procedures required by banks today, and hence hardly predicated on the
    652 creation of a national or even global electronic identity platform with its
    653 associated dangers for individual freedom and
    654 democracy~\cite{Helbing2019,french2021}.
    655 
    656 An interesting aspect that all these electronic payment systems based on a
    657 tokenization system would share is that they require some trust
    658 into the issuer of the currency, as in all cases the issuer could renegotiate on its
    659 promise to redeem the electronic tokens for the underlying asset.
    660 For such systems it should be possible for third parties to audit the issuer of
    661 tokens~\cite{dold2019}, which in the absence of fractional reserve banking
    662 reduces the risk from the issuer to that of the underlying asset class.
    663 
    664 We note that issuer risk always exists and this mitigation is crucial.  With
    665 cryptocurrencies, an issuer (like a cryptocurrency exchange) defaulting is
    666 a type of exit scam commonly called a ``rug pull'' for cryptocurrency
    667 ``investments''.~\cite{rugpull} For (largely historic)
    668 currencies tied to gold such a ``default'' was legalized by calling it
    669 ``abandoning the gold standard'' or ``currency reform''.  We note that even
    670 modern fiat currencies usually have some limited backing in the form of assets
    671 held by the central bank that the central bank is expected to wisely use these
    672 assets to stabilize the value of its currency. Here, the equivalent of an exit
    673 scam is hyperinflation from quickly balooning central bank liabilities. The
    674 effect is equivalent to an exit scam, as it again effectively disowns the
    675 holders of the central-bank backed tokens. Hence, even central bank
    676 liabilities are hardly ``risk-free assets'', a final questionable claim
    677 repatedly made in the ECB's report.  The same assumption of the Euro not
    678 requiring trust into the ECB is made in the French report. In their section on
    679 trust, the authors try to contrast ``natural'' trust in fiat currencies with
    680 ``abnormal'' trust for cryptocurrencies. The authors write that ``While trust
    681 in money has long relied on a mechanical guarantee in gold or the role of the
    682 state, neither of these guarantees of trust exist for
    683 cryptocurrencies.''\footnote{Si la confiance en la monnaie a longtemps reposé sur une garantie mécanique en or ou sur le rôle de l’État, aucun de ces gages de confiance existent pour les cryptomonnaies. }. Here, the authors pretend to be unaware that the Euro is
    684 neither based on a mechanical guarantee in gold (first abandoned in France
    685 during the First World War and then definitively under the Popular Front
    686 almost a century ago), nor on the role of a state since the Eurozone has none
    687 of the prerogatives of a state (army, tax, foreign policy, or even
    688 government).
    689 
    690 Confidence in fiat currencies is much more complex than what is described in
    691 the French report, and one must at least include the following elements:
    692 \begin{itemize}
    693 \item confidence in the non-inflationary nature of the currency (it can be hoarded without significant risk)
    694 \item confidence in the stability of the exchange rate (it is safe to trade with other assets)
    695 \item confidence in the banking system (that assets will not disappear overnight)
    696 \end{itemize}
    697 All these properties are currently those of the major European currencies,
    698 even if this has not always been the case. From this perspective, we can see
    699 that some of the large crypto-currencies also more or less respect these
    700 criteria (with some problems on the side of price stability).
    701 
    702 
    703 
    704 \section{Conclusion}
    705 
    706 There are no trusted third parties. That does not prevent people from
    707 designing and deploying systems that rely on the assumption that a trusted
    708 third party exists. Central banks must not follow the former DIRNSA's
    709 hybris~\cite[page 6f]{cwps}
    710 and assert that they are an eternally trusted third party.
    711 
    712 The dominance of accounts on the Internet and the resulting delegation of
    713 economic and political power to big Internet service providers sets a
    714 dangerous precedent for the design of CBDCs. It is time for central banks
    715 to abandon this account-centric mindset, which will help them address
    716 privacy issues and help the Internet transcend surveillance capitalism.
    717 
    718 More specifically, the ECB needs to review its design approach for the Digital
    719 Euro and commit to granting financial sovereignty to its constituents. Instead
    720 of controlling the citizen's privacy and forcing a particular ECB App onto
    721 % FIXME: I'd suggest "users' phones",
    722 % unless it is really meant that one
    723 % user has multiple phones.
    724 CBDC user's phones, the ECB needs to design a Digital Euro based on respect
    725 for the citizen's sovereignty and self-responsibility.  A digital cash system
    726 can be build using privacy-preserving open protocols with Free Software
    727 reference implementations.  The resulting self-responsibility of citizens will
    728 address various key design challenges inherent to account-based designs,
    729 including the biggest challenge of all: creating a product citizens would
    730 actually like to use.
    731 
    732 %[oec] Highlight again that alternatives _are_ on the table
    733 
    734 
    735 
    736 % We thank XXX for insightful comments on an earlier draft of this text.
    737 
    738 \bibliographystyle{alpha}
    739 \bibliography{literature}
    740 
    741 
    742 \end{document}
    743 
    744 Cut for brevity:
    745 
    746 
    747 
    748 Most crypto-currencies seek to have the properties of a currency, the
    749 conservation of value and the availability for exchange. For the two largest
    750 of them (BTC and ETH), we must note that since their creation they have been
    751 able to play the two roles of a currency. These currencies are both available
    752 for exchange and can be hoarded. These currencies are subject to great
    753 variations in price, but they are far from the variations of the Argentine
    754 Peso (which is commonly considered to be a currency). Some also have limited
    755 availability for real-time transactions, with Bitcoin for example requiring a
    756 very long validation time preventing its use for everyday purchases, but can
    757 be used for remote purchases (say for international remittances) where
    758 latencies and costs are actually competitive compared to existing payment
    759 systems.
    760 
    761 Central banks manage fiat currencies. These currencies are also mainly
    762 digital, as often the actual transactions are facilitated by digital payment
    763 systems bolted on top of the currency provided by the central bank.  While it
    764 is in most cases still possible to use the central bank provided physical cash
    765 directly, transactions using real coins and bills are declining. The quantity
    766 of money, as well as the interest rate at which this money is made available
    767 to banks, allows central banks to influence the value of the currencies they
    768 manage.