Exclusively Informational Money (EXIM) Redefines Digital Asset Security

Category: Innovation & Design · Effect: Strong effect · Year: 2013

Digital currencies can be designed as 'exclusively informational money' (EXIM), where units are controlled but not owned, fundamentally altering security requirements by deemphasizing traditional computer security in favor of cryptographic information security.

Design Takeaway

When designing digital currencies or assets, consider whether they are 'owned' or merely 'controlled' to determine the most effective security strategies, potentially reducing reliance on traditional access controls.

Why It Matters

This concept challenges conventional approaches to digital asset security, suggesting that the ownership model of a digital currency dictates its security needs. Designers can leverage this understanding to create more robust and user-friendly digital systems by focusing on the inherent properties of the information itself rather than solely on access control mechanisms.

Key Finding

Digital money can be designed so users control it but don't own it, meaning it can't be stolen but can be lost. This shifts security focus from typical computer defenses to cryptographic methods.

Key Findings

Research Evidence

Aim: What are the security implications of designing digital currency as exclusively informational money (EXIM)?

Method: Conceptual analysis and thought experiment

Procedure: The paper introduces the concept of Technical Informational Money (TIM) and develops the more extreme notion of Exclusively Informational Money (EXIM). It then analyzes the security requirements for EXIMs, contrasting them with traditional computer security measures, and uses Bitcoin as a case study, proposing a hypothetical EXIM called Bitguilder.

Context: Digital currency and financial technology design

Design Principle

The security model of a digital asset should be intrinsically linked to its ownership and control paradigm.

How to Apply

When developing new digital tokens or cryptocurrencies, analyze whether the design intends for users to 'own' the token or simply 'control' its state. This distinction will guide the necessary security measures.

Limitations

The analysis is largely theoretical and relies on a hypothetical construct (Bitguilder) to illustrate EXIM principles. The ethical assessment of Bitcoin is also a significant component, which may be outside the scope of pure technical design.

Student Guide (IB Design Technology)

Simple Explanation: Imagine digital money that you can use and manage, but you don't technically 'own' it like a physical object. This means it can't be stolen from you, but you could accidentally lose it. Because of this, we don't need as many passwords and firewalls as usual, but we still need strong encryption to make sure the information is safe.

Why This Matters: Understanding different models of digital asset control, like EXIM, helps you design more secure and innovative digital products. It challenges you to think beyond traditional security assumptions.

Critical Thinking: If digital assets are designed as EXIM, what are the ethical implications of users 'losing' assets that are not technically owned by anyone?

IA-Ready Paragraph: The concept of Exclusively Informational Money (EXIM) offers a novel perspective on digital asset security. By designing digital units that are controlled but not owned, designers can shift the focus from traditional computer security measures like passwords and firewalls towards a greater reliance on cryptographic information security. This approach acknowledges that such assets cannot be stolen but can be lost, thereby informing the development of more appropriate and potentially more user-friendly security protocols for digital currencies and other digital assets.

Project Tips

How to Use in IA

Examiner Tips

Independent Variable: Design paradigm of digital money (e.g., owned vs. controlled)

Dependent Variable: Security requirements and measures

Controlled Variables: ["Nature of digital units","User interaction with digital units"]

Strengths

Critical Questions

Extended Essay Application

Source

Bitcoin and Beyond: Exclusively Informational Money · UvA-DARE (University of Amsterdam) · 2013