privacy.tex (45971B)
1 \documentclass{article} 2 3 \usepackage{url} 4 \usepackage{enumitem} 5 \usepackage{authblk} 6 7 \title{Cental Bank Accounts are Dangerous and Unnecessary \\ A critique of two 8 papers\footnote{We thank Martin Summer for encouraging us to put our 9 critique of the ECB's report in writing. We thank central bankers for their 10 good aspirations, which they should keep up even if we question their 11 universal realization.}} 12 13 \author[$\triangle\pounds$]{Antoine~d'Aligny} 14 \author[$\triangle$]{Emmanuel~Benoist} 15 \author[$\dagger\heartsuit$]{Florian~Dold} 16 \author[$\triangle\dagger\heartsuit$]{Christian~Grothoff} 17 \author[$\S$]{\"Ozg\"ur~Kesim} 18 \author[$\ddagger\heartsuit$]{Martin~Schanzenbach} 19 \affil[$\triangle$]{Bern University of Applied Sciences} 20 \affil[$\pounds$]{École d'Ingénieurs Généraliste du Numérique} 21 \affil[$\dagger$]{Taler Systems SA} 22 \affil[$\S$]{Freie Universit\"at Berlin} 23 \affil[$\ddagger$]{Fraunhofer Institute for Applied and Integrated Security} 24 \affil[$\heartsuit$]{The GNU Project} 25 \date{\today} 26 \begin{document} 27 28 \maketitle 29 30 \abstract{ 31 In December 2021 the European Central Bank (ECB) published a report on ``Central Bank Digital 32 Currency: functional scope, pricing and controls'' in its Occasional Paper 33 Series~\cite{ecb2021}, detailing various challenges for the 34 Digital Euro. While the authors peripherally acknowledge the existence of 35 token-based payment systems, the notion that a Digital Euro will somehow 36 require citizens to have some kind of central bank account is pervasive in the 37 paper. We argue that an account-based design cannot meet the ECB's stated 38 design goals and that the ECB needs to fundamentally change its mindset when 39 thinking about its role in the context of the Digital Euro if it wants the 40 project to succeed. 41 42 Along the same lines, the French National Council for Digitalization published 43 a report on ``Notes and Tokens, The New Competition of 44 Currencies''~\cite{french2021}. Here, the authors make related incorrect 45 claims about inevitable properties of Central Bank Digital Currencies 46 (CBDCs), going as far as stating that a CBDC is not possible without an eID 47 system. Our paper sets the record straight. 48 49 % [oec] Shouldn't we also mention GNU Taler already here as an example for an alternative? 50 51 \noindent 52 {\bf JEL Classification Codes:} E42, E58 \\ 53 {\bf Keywords: } retail CBDC, privacy, crypto-currency, trust 54 55 56 \section{Introduction} 57 \label{sec:intro} 58 59 This article presents our comments regarding two papers that have been written 60 by the European Central Bank (ECB)~\cite{ecb2021} and the French National 61 Council for Digitalization\footnote{Conseil national du numérique} 62 (CNNum)~\cite{french2021}. As the French report is using some rather unclear 63 definitions of currency and crypto-currency, we will begin with a brief 64 introduction of terms and technologies. 65 66 We will then explain why the ECB should not be the only guardian of the 67 privacy of the European citizen and why coupling of a Central Bank Digital 68 Currency (CBDC) with an identity system is a bad idea. We address a question 69 raised in the ECB's report on the risks of a retail CBDCs promoting 70 disintermediation to a degree that might threaten traditional banks. 71 72 The second part of this paper proposes a set of design principles that any 73 retail CBDC must integrate. We then argue that a retail CBDC based on GNU 74 Taler would not only satisfy these principles, but also could provide an added 75 value over existing commercial solutions for a retail CBDC. Finally, we 76 explain how tokenization can help to build an eGold payment system or a system 77 allowing micropayments in Bitcoins and Ethereum. 78 79 80 \section{Currency, crypto-currency and payment systems} \label{sec:terms} 81 82 Currency is ``something that is used as a medium of exchange; 83 money.''\cite{dictionaryCurrency}. From the French dictionary, currency 84 (i.e. la monnaie) is an ``Instrument of measurement and conservation of 85 value, legal means of exchanging goods''\footnote{Instrument de mesure et 86 de conservation de la valeur, moyen légal d'échange des biens.}, or 87 ``Unit of value accepted and used in a country, a group of 88 countries.''\footnote{Unité de valeur admise et utilisée dans un pays, un 89 ensemble de pays.}~\cite{LeRobertMonnaie} 90 The main desired properties of a currency are therefore: conservation of value and 91 availability for exchange. 92 93 For more than a hundred years, most currencies were issued by central banks. 94 Over the last decade a large number of new crypto-currencies have appeared, 95 and these currencies are not tied to any central bank. The first and best 96 known of them is Bitcoin~\cite{nakamoto2008re}. The various crypto-currencies 97 are very heterogeneous and based on different principles. Some use accounts 98 with balances with a blockchain used to establish a consensus on the account 99 balances (Bitcoin was the first currency to use it), while others allow the 100 transfer of fungible tokens that are disassociated from any transaction 101 history (Zcash~\cite{zcash}). Among those using a blockchain, some use proof 102 of work (Bitcoin, Ethereum), others use proof of stake 103 (Ethereum, expected in Q2 2022~\cite{merge2022,nelson2021}) or most recently 104 proof of wasted human lifetime (Play to Earn~\cite{p2e2022}). Some are rather 105 transparent (Bitcoin, Ethereum), while others allow private transactions 106 (Monero~\cite{noether2015ring}). 107 108 Crypto-currencies do not have a central bank controlling the rules governing 109 the currency. Instead, software developers program rules into algorithms. New 110 rules are adopted if they find the consensus of the ``miners'' (for 111 crypto-currencies using proof of work) or ``stakeholders'' (for 112 crypto-currencies using proof of stake). In general, the rules are written to 113 produce some artificial scarcity of the currency minted according to the 114 rules, so as to convince hoarders of the value of their limited-edition 115 bitstrings. A key design challenge is thus to provide ample rewards to 116 ``miners'' and ``stakeholders'' that facilitate transactions while maintaining 117 a limited supply. 118 119 Crypto-currencies are beginning to gain functionalities through the addition 120 of payment systems on top of these basic currency mechanisms. In general, any 121 payment system enables participants to make financial transactions, but does 122 not in itself establish a new currency. Compared to the transaction mechanisms 123 offered by the underlying currency, payment systems can provide credit, make 124 transactions faster, cheaper, more private or more usable. Payment systems may 125 require their users to trust payment system providers, as these intermediaries 126 may introduce new failure modes into the system. As a result, payment service 127 providers are generally regulated entities, at least when they deal with 128 traditional fiat currencies. Examples for payment systems used with 129 crypto-currencies include the various proprietary crypto-trading platforms as 130 well as distributed layer-2 solutions like the Lightning 131 network~\cite{lightening}. 132 133 There are two types of CBDCs, retail CBDCs and 134 wholesale CBDCs. Wholesale CBDC is expected to be primarily used to trade 135 between banks and between the central bank and banks. An example of wholesale 136 CBDC can be found in the description of the project Helvetia of the Swiss 137 National Bank~\cite{BISHelvetia2020}.\footnote{We note that the French report 138 confuses project Helvetia (which implements a wholesale CBDC) with an 139 entirely different proposal~\cite{chaum2021} for a retail CBDC.} In 140 contrast, a retail CBDC is intended to be used by citizens and businesses in 141 their daily lives for their ordinary expenses, basically providing a form of 142 digital cash that is, like physical cash, a liability of the central bank. 143 This paper is about retail CBDCs. Our discussion will 144 assume that the currency for the CBDC already exists, and thus focus on the 145 requirements for the payment system that facilitates ordinary people to make 146 digital transactions with such a currency. 147 148 149 \section{Central Banks cannot be the Guardian of Privacy} 150 \label{sec:guardians} 151 152 The ECB's report starts with a public interest-oriented self-image of central 153 banks. For example, the authors claim that ``central banks operate in the 154 interest of society, setting goals in the public interest rather than private 155 interest'' and ``as public and independent institutions, central banks have no 156 interest in monetising users' payment data. They would only process such data 157 to the extent necessary for performing their functions and in full compliance 158 with public interest objectives and legislation.'' While this is a laudable 159 aspiration, it is a false statement: The Bank of Greece, one of the central 160 banks of the Eurosystem, is dominantly privately held and listed on the Athen's 161 stock exchange~\cite{BG2016}. Similar constructions with privately owned 162 central banks exist outside of the Eurozone, for example with the Swiss 163 National Bank~\cite{SNB}. That all central banks are independent and operate 164 in the public interest is sometimes questioned in the popular 165 press~\cite{tcimer2020}. With counter-examples inside the 166 European System of Central Banks (ECBS) itself and within Europe, it is clear 167 one needs to be careful to avoid confusing the idealistic view of central 168 banks as politically neutral and public-minded institutions with reality. 169 To build secure systems, it is best to assume that all parties, 170 including the system's designers, implementors and main operators 171 themselves, could be malicious. 172 173 Central banks thus need to take a different mindset, and idally picture 174 themeselves as malicious actors when working on the design of a CBDC. Only 175 this way, they will avoid designs which would entrust them with information 176 and decisions that they must not be entrusted with. For example, the ECB's 177 report currently suggests that the ECB ``may also prefer the (...) the ability 178 to control the privacy of payments data''. This is a fundamental misconception 179 of the notion of privacy. Citizens will \emph{only} have privacy with a 180 Digital Euro if they themselves have control over their payment data. Privacy 181 and the human right of informational self-determination requires that each 182 (legally capable) citizen is in control of their personal data. A central 183 bank asserting the ``ability to control the privacy'' is thus an oxymoron: 184 once anyone else has control, citizens have no privacy. Public institutions 185 that act in the public interest must acknowledge this to not patronize their 186 sovereign: the citizens. 187 188 The French report~\cite{french2021} correctly states that a Digital Euro based 189 on accounts poses ``democratic risks''\footnote{risques démocratiques} and could allow ``state surveillance of 190 all transactions of every individual''\footnote{surveillance de toutes les transactions de chaque individu par l’État}. 191 Subsequently the wording of the French report is misleading, as it turns the 192 possibility of privacy-invasive monitoring into a mandatory feature of any 193 CBDC, which is demonstrably false: There are many digital currencies and 194 payment systems that do not allow comprehensive 195 surveillance~\cite{monero,dold2019}. Thus, it is wrong for the authors of the 196 French report to take a possible design choice of an account-based system as a 197 necessity, for example when they write that ``the centralization and data 198 tracking of CBDC projects leads to a loss of privacy 199 that coupled with the programmability of the currency can have serious 200 consequences.''\footnote{Toutefois, la centralisation et la traçabilité des données des projets de monnaie numérique de banque centrale conduit à une perte de vie privée qui, associée à la programmabilité de la monnaie, peut avoir de lourdes conséquences. } Using the indicative here is a serious mistake, as it is 201 understood that any CBDC design would necessarily lead to a loss of privacy, 202 when this is false. 203 204 Furthermore, the use of the term ``surveillance'' in the French report actually 205 understates the negative impact of an account-based CBDC, as with an 206 account-based CBDC the central bank would likely also be in a position to 207 prevent individuals from spending money and to manipulate their balances, 208 thereby gaining comprehensive power over the economic activities of 209 individuals going far beyond mere analytical capabilities. The use of 210 permissioned blockchains does not inherently prevent such manipulations as 211 long as the participating operators are colluding. Thus, if European 212 democratic ideals and personal freedoms are to prevail, we clearly cannot 213 ignore this danger and must reestablish the principles of personal 214 responsibility, personal independence and subsidiarity in the design processes 215 for critical infrastructure created by European institutions. 216 217 Since this conjecture is taken as fact while counterexamples 218 exists, the conclusion of the first part of the French report follows a 219 logical fallacy. The authors assert that ``the new properties of CBDC raise 220 political questions''\footnote{``Dans un contexte où les nombreux projets d’émettre 221 des monnaies numériques viennent étendre le rôle des banques 222 centrales se pose la question des enjeux démocratiques et politiques de 223 ces nouveaux attributs.''} which implies that the deployment of a CBDC would be 224 impossible in the current state. But adaptations of central bank missions to 225 include ``absolute control over the rules and regulations of the use'' of 226 money via the issuance of a CBDC (as envisioned by Agustín Carstens of the 227 Bank for International Settlements\footnote{See speech given on October 19th 228 2020 on ``Cross-Border Payment -- A vision for the future'', 229 \url{https://meetings.imf.org/en/2020/Annual/Schedule/2020/10/19/imf-cross-border-payments-a-vision-for-the-future} 230 at 00:24:30}) are dangerous 231 if the central bank can choose to void privacy assurances. Carstens correctly states 232 that with the proposed CBDC design the central bank would have the ability to know about every 233 payment. Consequently, the central bank would be able to strictly enforce 234 its rules and regulations, which implies the bank could arbitrarily block 235 payments by private citizens. The repressive potential of a government with 236 such a capability is so large that it must be firmly rejected. 237 238 \section{Harmful coupling with identity} 239 \label{sec:coupling} 240 241 The risk is not theoretical. The Emergencies Act of February 2022 granted the 242 Canadian executive the right to freeze bank accounts without judicial 243 oversight. The Canadian minister of justice David Lametti promptly used this 244 to threaten people on CTV News with extrajudicial asset freezes if they were 245 making significant financial contributions to a political cause he strongly 246 disagrees with.\footnote{\url{https://www.youtube.com/watch?v=xoTCxWSQW30}} If 247 this is possible in Canada today, we do not want to imagine what might happen 248 in less established democracies if an account-based CBDC were to largely 249 displace cash. 250 251 Consequently, the question should be if central banks should limit CBDC 252 issuance within the scope of their current mission instead of modifying their 253 rulebooks. Wisely, the US Federal Reserve is currently barred from 254 maintaining digital account balances for individuals~\cite{usfed2022}. We 255 consider this law wise, as we argue that tightly coupling payments with 256 identity is harmful. While the law prevents the Federal Reserve's from 257 issuing an account-based retail CBDC, it does not seem to prevent the Federal 258 Reserve from issuing a token-based privacy-respecting CBDC. This is crucial, 259 as the technology behind token-based privacy-respecting CBDCs would 260 fundamentally not support the kind of asset freezes enabled by the Canadian 261 Emergencies Act. 262 263 In contrast, ECB report suggests that ``combining use of digital identity and 264 CBDC'' might be beneficial. The same idea is echoed in the French report which 265 quotes an unpublished report from Catenae (2020) to say that ``it is difficult 266 to envisage the creation of a retail CBDC, and more specifically a Digital 267 Euro without first creating a reliable, secure digital identity offering the 268 necessary guarantees''\footnote{il est difficile d'envisager la création d'une 269 monnaie numérique de banque centrale de détail, et plus particulièrement d’un 270 ``euro numérique'', sans création préalable d'une identité numérique fiable, 271 s\'ecuris\'ee et offrant les garanties nécessaires}. From a technical 272 perspective, the statement is hard to defend since current cryptocurrencies 273 work perfectly well without depending on a ``trusted digital identity''. 274 275 From a regulatory perspective, it is understood that institutions working with 276 a Digital Euro will at times be legally required to establish the identity of 277 actors. However, when a Digital Euro needs a digital identity for some of the 278 actors in the digital currency production chain, one can use existing 279 Know-Your-Customer (KYC) processes of commercial banks or use certificates 280 based on the already widely used X.509 standard, which are both already in 281 common use on the Internet.\footnote{They correspond to the ``s'' in 282 ``https'', for example.} While we can imagine a world in which a new 283 ``trusted digital identity'' exists, and develop new protocols for this world, 284 this is by no means a prerequisite to any work on a Digital Euro. Waiting for 285 the creation of a new trusted digital identity at the European level before 286 creating a CBDC may be equivalent to postponing the decision indefinitely, and 287 the necessity of first deploying a new electronic identity scheme is not shown 288 by the authors. 289 290 What neither report appreciates is that combining payments with such a digital 291 identity system would create a serious liability. Even if central banks were 292 neutral custodians of citizens' privacy (see Section~\ref{sec:guardians}), the 293 problem is the data itself. As Bruce Schneier has concisely argued already in 2016: 294 ``Data is a toxic asset. We need to start thinking about it as such, and treat 295 it as we would any other source of toxicity. To do anything else is to risk our 296 security and privacy.''~\cite{schneier2016toxic} 297 Despite this well-established insight, the ECB report is insinuating to link 298 identities with payments which consequently and inevitably produces highly 299 sensitive\footnote{Or to stick with Schneier's analogy, ``super-toxic''} 300 metadata. Referring to the toxicity of this metadata, Edward Snowden famously 301 said at IETF 93 in 2019 302 that \begin{quote} ``(...) we need to get away from true-name payments on the 303 Internet. The credit card payment system is one of the worst things that 304 happened for the user, in terms of being able to divorce their access from 305 their identity.'' 306 \end{quote} 307 If the European Union wants to avoid a dystopia of the transparent citizen 308 and catastrophic cases of personal data theft, it must enable citizens to put a 309 firewall between their identity and their payments. 310 311 Citizens themselves are well aware of this aspect and it consequently would 312 have a significant impact on acceptance of a CDBC: The Swiss population 313 recently rejected a proposal for a national eID~\cite{eid2021}, and the newly 314 elected German government is promising a reversal of ubiquitous data retention 315 (without cause)~\cite{koalitionsvertrag2021}. The European Parliament has 316 members proposing to ban the use of facial recognition in public 317 spaces~\cite{euai2021}. The ECB's proposal seemingly ignores the popular 318 rejection of treating every citizen as a criminal suspect by doubling down. 319 The missing link in the ECB proposal that would reveal the dystopic reality 320 they would invoke would be a statement that facial recognition could be used 321 to conveniently establish the payer's identity --- or ``pay with your smile'', 322 as contemporary account-based digital payment offerings already put it. We 323 stress that CBDC payment data, like other payment data, can be expected to be 324 retained for 6 or more years~\cite{fca}. If CBDC payment data is additionally 325 strongly coupled with our identities, those who dislike living in a panopticon 326 could only hope for such a CBDC to be rarely used. 327 328 329 330 \section{Addressing Balance Sheet Disintermediation via Self-Custody} 331 \label{sec:disintermediation} 332 333 The ECB report describes the risk of (commercial) bank balance sheet 334 disintermediation as one of the major risks to consider from the introduction 335 of a CBDC. Basically, the risk is that consumers losing faith in a 336 commercial bank may shift funds into CBDC, thereby exacerbating the situation 337 by creating a ``bank run''. 338 The ECB report discusses various strategies, but primarily focuses on limiting 339 ``hoarding'' of CBDC by imposing a balance limit. They then realize that this 340 can be quite difficult, as businesses may have varying needs for CBDC, so a 341 fixed low limit would strangle the utility of the CBDC, while a fixed high 342 limit may not be effective. They then propose a dynamic limit which they would 343 ``calculate in accordance to (...) presumed cash needs''. 344 345 Here, the authors might want to review some of the hard lessons from the 346 introduction of $CO_2$ emissions certificates, where initial allocations were 347 calculated based on ``presumed emission needs'' of certain industries, 348 resulting in windfalls for shifty polluters that managed to rig the 349 calculations, giving them excess certificates that they could then 350 resell.~\cite{carbon} If CBDC holdings are limited and financially attractive, 351 there will clearly again be businesses profiting from organizing their 352 business data to obtain high account limits. This kind of socially 353 unproductive optimization will happen regardless of the specific rules that 354 the ECB will design. Thus, this is a fundamentally flawed design. 355 356 357 The ECB's focus on account-based solutions seems to have caused it to ignore a 358 better solution that was proposed in~\cite{snb2021}, even though it was 359 clearly on the table: When justifying the need to control hoarding of CBDC, 360 the authors write that ``risk-free assets have a negative yield (apart from 361 banknotes, which are costly and risky to store in large amounts)''. Here, 362 they presume that hoarding CBDC must be risk-free. However, with Digital Euros 363 represented as tokens that citizens hold in self-custody, the CBDC would not 364 be risk-free: citizens would have to safeguard their digital devices (both 365 physically and against malware). Owners of cryptocurrencies are very familiar 366 with the fact that self-custody is risky~\cite{hacks1,hacks2}. Thus, a CBDC 367 design using digital tokens under the control of citizens indirectly provides a 368 good solution for hoarding, as self-custody of the digital assets entails a 369 risk, quite comparable to the risk of hoarding cash. By analyzing this risk, 370 citizens and businesses would themselves determine appropriate individual 371 limits for their CBDC holdings based on their actual cash needs. 372 373 374 \section{Design principles for CBDCs} 375 376 We think that any CBDC must be based on the following design principles 377 inspired by~\cite{dold2019}, given in order of priority: 378 379 \begin{enumerate} 380 \item \textbf{A CBDC must be implemented as Free Software.} 381 382 Free refers to ``free as in free speech'', as opposed to ``free as in free beer''. 383 More specifically, the four essential freedoms of free software 384 \cite{stallman2002essays} must be respected, namely users must have the 385 freedom to (1) run the software, (2) study and modify it, (3) redistribute 386 copies, and (4) distribute copies of the modified version. 387 388 This prevents vendor lock-in, as another software provider can 389 take over, should the current one provide inadequate quality of service. 390 Only Free Software can be seen as truly respecting the sovereignty of 391 citizens using the software, as well as countries relying on it. 392 As the ECB report states, international or even cross-border use of a 393 CBDC may be desireable, but this excludes solutions that would be under 394 the control of one nation unless we presume that nations will be willing 395 to subject critical infrastructure to the whims of other nations. 396 Recent attacks by the US government against Huawei effectively limited 397 Huawei's ability to use US software~\cite{huawei}. Such political games 398 can cause significant suffering for the population when they impact 399 critical infrastructure. It is thus clear that 400 only domestic or Free Software is acceptable for critical infrastructure of sovereign 401 countries. Cross-border payments using the same payment system 402 require at least one country to use 403 non-domestic software. Thus, only with Free Software all countries and 404 organizations can run the payment system without the risk of being controlled by 405 foreign entities. Customers benefit from this freedom, as the wallet 406 software can be made to run on a variety of platforms, and user-hostile 407 features such as tracking or telemetry could easily be removed from 408 wallet software. 409 410 This rules out the mandatory usage of specialized 411 hardware such as smart cards or other hardware security modules, as the 412 software they run cannot be modified by the user. These components can, 413 however, be voluntarily used by merchants, customers or payment processors 414 to increase their operational security. 415 416 \item \textbf{A CBDC must protect the privacy of buyers.}\label{item:privacy} 417 % FIXME: I'd suggest a comma after 'possible', 418 % otherwise 'possible' might be understood as 419 % a adjective for 'privacy'. 420 Where possible, privacy should be guaranteed via technical measures as opposed to mere 421 organizational policies. Especially with micropayments for online content, a 422 disproportionate amount of rather private data about buyers would be revealed, if 423 the payment system does not have privacy protections. 424 425 In legislations with data protection regulations (such as the recently introduced GDPR in Europe~\cite{voigt2017eu}), 426 merchants benefit from this as well, as no data breach of customers can happen if this information 427 is, by design, not collected in the first place. Obviously some private data, such as the shipping 428 address for a physical delivery, must still be collected according to business needs. 429 430 The security of the payment systems also benefits from this, as the model 431 shifts from authentication of customers to mere authorization of payments. 432 This approach rules out whole classes of attacks such as phishing~\cite{garera2007framework} or credit 433 card fraud~\cite{sahin2010overview}. 434 435 \item \textbf{A CBDC must enable the state to tax income and crack down on 436 illegal business activities.} 437 438 Naturally, a central bank cannot deploy a payment system that does not 439 meet broadly accepted rules and regulations for payment systems. While 440 it is conceivable that specific rules and regulations may be modified to 441 accomodate a CBDC, it is inconceivable that states would relax the rules 442 to the point where businesses receiving income are not held accountable 443 for their actions, especially as there seems to be a broad consensus that 444 levying of taxes based on economic activity is beneficial to society. 445 446 \item \textbf{A CBDC must prevent payment fraud.} 447 448 This imposes requirements on the security of the system, as well as on the 449 general design, as payment fraud can also happen through misleading user 450 interface design or the lack of cryptographic evidence for certain 451 processes. 452 453 \item \textbf{A CBDC must only disclose the minimal amount of information 454 necessary.} 455 456 The reason behind this goal is similar to (\ref{item:privacy}). The 457 privacy of buyers is given priority, but other parties such as merchants 458 still benefit from it, for example, by keeping details about the merchant's financials 459 hidden from competitors. Similarly, the central bank should not know 460 all the details of say the contract between a merchant and a consumer, and 461 only learn the amount transacted. Other state agencies, such as the tax 462 office during a tax audit, may be able to compell merchants to disclose 463 additional information, but again always only the minimal amount necessary 464 for the specific function. 465 466 \item \textbf{A CBDC must be usable.} 467 468 Specifically it must be usable for non-expert customers, such as children. 469 We note that account-based payments are generally not accessible to 470 children, as they are often unable to open a regular bank account under 471 current rules. This alone is a good reason for a CBDC to not be 472 account-based! Usability also 473 applies to the integration with merchants, and informs choices about the 474 architecture, such as encapsulating procedures that require cryptographic 475 operations into an isolated component with a simple API. 476 477 \item \textbf{A CBDC must be efficient.} 478 479 Approaches such as proof of work are ruled out by this requirement. Efficiency is 480 necessary for a CBDC to scale to the hundreds of thousands of transactions 481 required to support larger economic areas. Efficient payments can also open 482 up new use-cases by enabling micropayments. 483 484 \item \textbf{A CBDC must avoid single points of failure.} 485 486 While a central bank is itself kind-of a single point of failure and inherent 487 in a CBDC, the technical deployment should avoid single 488 points of failure. This manifests in architectural choices such as 489 the isolation of certain components, and auditing procedures. 490 491 \item \textbf{A CBDC must foster competition.} 492 493 It must be relatively easy for various commercial businesses to operate 494 components of the overall payment system. While the 495 barriers for this in traditional financial systems are rather high, the 496 technical burden for new operators to join must be minimized. Operators 497 may incluce licensed entities such as banks (for operations that are closely 498 related to the payment processing), but also unlicensed entities can partake 499 in activities such as enabling backups or integrating payment services at 500 retailers. A design choice that supports this is to split the whole system into smaller 501 components with well-defined protocols between them, such that the various 502 components can be operated, developed and improved upon independently, 503 instead of having one completely monolithic system. 504 505 \end{enumerate} 506 507 In our opinion, any candidate for CBDC must follow at least those principles 508 to be trustworthy and successful. 509 510 A cross-cutting concern here is that when achieving the security goals, the 511 CBDC must never rely on the central bank being trustworthy. Good security 512 designs always strive to avoid trusted parties. This implies that neither the 513 correctness nor the privacy assurances must rely on an honest central bank. 514 This false sense of security also became evident when the former director of 515 the NSA (DIRNSA) revealed his belief that with respect to control over the 516 toxic data assets accumulated by the NSA ``nobody comes after us''~\cite[page 517 6f]{cwps}, suggesting that the (by the DIRNSA clearly presumed trustworthy) 518 US government would never fall. The assumption turned deadly when the Taliban 519 took over personal profiles including biometric data of Afgahnis that had 520 collaborated with NATO forces after the retreat of NATO in 521 2021~\cite{afganistan2021}. We must not make the same mistake, that is 522 believing that our institutions are good and eternal, when it comes to our 523 private payment data. Thus, it is necessary that technical protections for our 524 privacy are put in place that even the central bank cannot break: 525 526 Privacy is most meaningful when it is guaranteed via technical measures, as 527 opposed to mere policies. Without a technical layer providing 528 privacy-by-default, financial transactions reveal unnecessary levels of 529 personal or private data. This would be especially true if a CBDC became a 530 ubiquitous payment method. Thus, a CBDC must protect the privacy of buyers and 531 avoid the use of accounts to avoid facilitating totalitarian control over the 532 population. Limited private data, such as the shipping address for a physical 533 delivery, may need to be collected by merchants (but not the central bank) 534 according to business needs and protected according to local laws. In this 535 case, the CBDC must enable deletion of such data as soon as it is no longer 536 required. 537 538 A possible trap for the design of a privacy-respecting CBDC is central banks 539 merely delegating responsibility for privacy-sensitive data to commercial 540 banks. Such a delegation does not provide adequate protection against state 541 overreach, as commercial banks still could too easily be compelled to sanction 542 opposition against the ruling party. Nevertheless, Auer's 543 proposal~\cite{bis948} to delegate the technical operation of a CBDC to 544 tightly supervised commercial banks as an alternative to the central bank 545 acquiring the technological prowess to centrally operate such a system has 546 merit: such a delegation can eliminate a likely single point of failure, and 547 might entice commercial banks to diversify the feature set. It would also give 548 commercial banks a raison d'être, and thus mitigate the risks from CBDC 549 disintermediation. In order for commercial banks to make a valuable 550 contribution when operating the CBDC, we believe the central bank would still 551 need to set an open standard to ensure interoperability. Strict 552 cryptographically-enforced privacy-assurances for consumers must be baked into 553 such a standard. 554 555 \section{GNU Taler} 556 557 We have implemented the GNU Taler token-based payment system based on the 558 above principles~\cite{dold2019}. GNU Taler offers an alternative to 559 ID/account-based systems, while still enabling the state to ensure business is 560 legal (and tax-paying) without infringing on the sovereignty of private 561 citizens. 562 563 In addition, CBDCs should also provide additional benefits compared to existing 564 digital payment systems. One of the key questions the ECB report raises is 565 what it might take for a CBDC to be successful in the market, as the authors 566 realize that even if a central bank offers a payment system, this does not 567 assure that the population will adopt it to a meaningful extend. 568 569 So far, we have already given several reasons for adoption, including the use 570 of Free Software, the protection of privacy, usability and cost-effectiveness. 571 Furthermore, we believe that a CBDC should also strongly consider the issue of 572 inclusion, from children to illiterate or innumerate users which are 573 underserved by contemporary commercial payment solutions. When it comes to 574 serving children, age-verification for Websites is a related domain where 575 digital identity-based solutions are inappropriately pursued today: With 576 Taler, we can cryptographically extend the principle of strictly protected 577 privacy also into the domain of age restrictions in 578 e-commerce~\cite{designagerestriction2021}. By integrating age restrictions 579 with privacy-preserving payments, we can enable legal guardians to protect 580 their wards without contributing to the conversion of sovereign citizens to 581 digital subjects. This extension offers benefits for society in multiple 582 ways: Buyers remain anonymous during payment, yet efficacy of age restriction 583 is guaranteed. Anonmyous age restriction during payment simplifies processees 584 for merchants significantly. It is based on the principle of subsidiarity and 585 gives control over age restriction to closest responsible persons (generally 586 the parents). And finally, for more than 5 million children in the European 587 Union between 10 and 18~\cite{EurostatAge10} this would allow participation in 588 e-commerce more freely. 589 590 Assuming that owners of bank-accounts are mature adults, it allows them to 591 withdraw age-restricted coins for their wards. The wards can then anonymously 592 spend the coins, but transactions will fail at merchants that sell goods with 593 an age restriction exceeding the age-limit of the coins as specified by the 594 bank account holder, acting as a guardian. This design guarantees that the 595 only information disclosed is that the age-restriction imposed by the merchant 596 is satisfied - but not the age itself. The payment service provider does not 597 even learn that age-restrictions are being used, and merchants cannot 598 distinguish successful purchases by adults from successful purchases by wards 599 with a sufficiently high age-limit. Thus, this design offers a clear 600 alternative to identity-based age-verification that is better aligned with the 601 principle of subsidiarity which requires that we solve problems at the smallest 602 unit that can solve them. And protecting the children should be the task of 603 their parents. We argue that the ECB should merely give the parents the 604 technical means to protect their children as they see fit, instead of taking 605 control. 606 607 608 \section{Tokenization beyond CBDC} 609 \label{sec:tokenization} 610 611 With electronic tokens it is possible to implement payment systems that are 612 not CBDCs. For example, a Swiss group around Claudio 613 Zanetti~\footnote{\url{https://www.zanetti.ch/}} is considering launching an 614 electronic payment system based on gold. Direct payments with physical gold 615 are problematic, as giving change 616 is impractical with 617 gold as is the validation that the gold is pure. With eGold, Zanetti plans to 618 ``establish a private competitor to the Swiss National Bank, that is not able 619 to deflate economic crises by inflating the currency at the expense of the 620 working class''.\footnote{Personal communication.} It remains to be seen if 621 this effective limitation on central bank policy making is ultimately 622 beneficial, given the ecological cost of mining gold and the detrimental effect 623 of rampant economic crises on the poor. Regardless, the idea is interesting as 624 it may require governments to take a more preventative stance against economic 625 crises --- and economists (naturally ignoring the global environmental impact 626 of mining gold) have previously claimed that a competing gold-backed payment 627 system might be inherently beneficial to the (Swiss) economy~\cite{nzz}. 628 629 Systems like Bitcoin and Ethereum that are based on distributed ledger 630 technology (DLT) are often confused with true token-based systems. In Bitcoin and 631 Ethereum funds are still stored in accounts that have a value because of an 632 incoming transaction, and not because some issuer backs the token. With the 633 Depolymerizer~\footnote{\url{https://git.taler.net/depolymerization.git}} we 634 have created an adapter that allows the tokenization of blockchain-based 635 cryptocurrencies. Here, the cryptocurrency would be held in escrow by a 636 trusted third party that backs the tokens representing Bitcoin or 637 Ether. By reducing the need for on-chain transactions, we expect that a 638 Depolymerized DLT can in theory scale linearly with the available 639 computational resources, primarily limited by the much slower transaction rate 640 of the underlying DLT for inbound and outbound on-chain transactions. The 641 resulting system would also provide durable transactions within milliseconds, 642 making cryptocurrency payments significantly more practical. However, like 643 with e-gold it would do nothing to mitigate the environmental cost of 644 (cryptocurrency) mining, so fiat currency remains an environmentally 645 preferable choice. 646 647 For the conversion between fiat currency, e-gold and Depolymerizer-tokenized 648 cryptocurrencies it is likely that regulated payment service pro\-viders will 649 be required to perform some kind of KYC procedure to 650 identify their customers. However, this is no different from identification 651 procedures required by banks today, and hence hardly predicated on the 652 creation of a national or even global electronic identity platform with its 653 associated dangers for individual freedom and 654 democracy~\cite{Helbing2019,french2021}. 655 656 An interesting aspect that all these electronic payment systems based on a 657 tokenization system would share is that they require some trust 658 into the issuer of the currency, as in all cases the issuer could renegotiate on its 659 promise to redeem the electronic tokens for the underlying asset. 660 For such systems it should be possible for third parties to audit the issuer of 661 tokens~\cite{dold2019}, which in the absence of fractional reserve banking 662 reduces the risk from the issuer to that of the underlying asset class. 663 664 We note that issuer risk always exists and this mitigation is crucial. With 665 cryptocurrencies, an issuer (like a cryptocurrency exchange) defaulting is 666 a type of exit scam commonly called a ``rug pull'' for cryptocurrency 667 ``investments''.~\cite{rugpull} For (largely historic) 668 currencies tied to gold such a ``default'' was legalized by calling it 669 ``abandoning the gold standard'' or ``currency reform''. We note that even 670 modern fiat currencies usually have some limited backing in the form of assets 671 held by the central bank that the central bank is expected to wisely use these 672 assets to stabilize the value of its currency. Here, the equivalent of an exit 673 scam is hyperinflation from quickly balooning central bank liabilities. The 674 effect is equivalent to an exit scam, as it again effectively disowns the 675 holders of the central-bank backed tokens. Hence, even central bank 676 liabilities are hardly ``risk-free assets'', a final questionable claim 677 repatedly made in the ECB's report. The same assumption of the Euro not 678 requiring trust into the ECB is made in the French report. In their section on 679 trust, the authors try to contrast ``natural'' trust in fiat currencies with 680 ``abnormal'' trust for cryptocurrencies. The authors write that ``While trust 681 in money has long relied on a mechanical guarantee in gold or the role of the 682 state, neither of these guarantees of trust exist for 683 cryptocurrencies.''\footnote{Si la confiance en la monnaie a longtemps reposé sur une garantie mécanique en or ou sur le rôle de l’État, aucun de ces gages de confiance existent pour les cryptomonnaies. }. Here, the authors pretend to be unaware that the Euro is 684 neither based on a mechanical guarantee in gold (first abandoned in France 685 during the First World War and then definitively under the Popular Front 686 almost a century ago), nor on the role of a state since the Eurozone has none 687 of the prerogatives of a state (army, tax, foreign policy, or even 688 government). 689 690 Confidence in fiat currencies is much more complex than what is described in 691 the French report, and one must at least include the following elements: 692 \begin{itemize} 693 \item confidence in the non-inflationary nature of the currency (it can be hoarded without significant risk) 694 \item confidence in the stability of the exchange rate (it is safe to trade with other assets) 695 \item confidence in the banking system (that assets will not disappear overnight) 696 \end{itemize} 697 All these properties are currently those of the major European currencies, 698 even if this has not always been the case. From this perspective, we can see 699 that some of the large crypto-currencies also more or less respect these 700 criteria (with some problems on the side of price stability). 701 702 703 704 \section{Conclusion} 705 706 There are no trusted third parties. That does not prevent people from 707 designing and deploying systems that rely on the assumption that a trusted 708 third party exists. Central banks must not follow the former DIRNSA's 709 hybris~\cite[page 6f]{cwps} 710 and assert that they are an eternally trusted third party. 711 712 The dominance of accounts on the Internet and the resulting delegation of 713 economic and political power to big Internet service providers sets a 714 dangerous precedent for the design of CBDCs. It is time for central banks 715 to abandon this account-centric mindset, which will help them address 716 privacy issues and help the Internet transcend surveillance capitalism. 717 718 More specifically, the ECB needs to review its design approach for the Digital 719 Euro and commit to granting financial sovereignty to its constituents. Instead 720 of controlling the citizen's privacy and forcing a particular ECB App onto 721 % FIXME: I'd suggest "users' phones", 722 % unless it is really meant that one 723 % user has multiple phones. 724 CBDC user's phones, the ECB needs to design a Digital Euro based on respect 725 for the citizen's sovereignty and self-responsibility. A digital cash system 726 can be build using privacy-preserving open protocols with Free Software 727 reference implementations. The resulting self-responsibility of citizens will 728 address various key design challenges inherent to account-based designs, 729 including the biggest challenge of all: creating a product citizens would 730 actually like to use. 731 732 %[oec] Highlight again that alternatives _are_ on the table 733 734 735 736 % We thank XXX for insightful comments on an earlier draft of this text. 737 738 \bibliographystyle{alpha} 739 \bibliography{literature} 740 741 742 \end{document} 743 744 Cut for brevity: 745 746 747 748 Most crypto-currencies seek to have the properties of a currency, the 749 conservation of value and the availability for exchange. For the two largest 750 of them (BTC and ETH), we must note that since their creation they have been 751 able to play the two roles of a currency. These currencies are both available 752 for exchange and can be hoarded. These currencies are subject to great 753 variations in price, but they are far from the variations of the Argentine 754 Peso (which is commonly considered to be a currency). Some also have limited 755 availability for real-time transactions, with Bitcoin for example requiring a 756 very long validation time preventing its use for everyday purchases, but can 757 be used for remote purchases (say for international remittances) where 758 latencies and costs are actually competitive compared to existing payment 759 systems. 760 761 Central banks manage fiat currencies. These currencies are also mainly 762 digital, as often the actual transactions are facilitated by digital payment 763 systems bolted on top of the currency provided by the central bank. While it 764 is in most cases still possible to use the central bank provided physical cash 765 directly, transactions using real coins and bills are declining. The quantity 766 of money, as well as the interest rate at which this money is made available 767 to banks, allows central banks to influence the value of the currencies they 768 manage.