Our approach to vulnerability disclosure
Disclosure of security vulnerabilities is a controversial topic. On the one hand, the “no disclosure” position holds that publicizing vulnerabilities provides bad actors with instruction manuals for attacks. On the other hand, the “full disclosure” movement argues that knowledge of security vulnerabilities enables the public to take precautions and protect themselves, encouraging security improvements. In computer security, the debate has centered around agreements known as “responsible disclosure” and “coordinated vulnerability disclosure”. Both advocate disclosing vulnerabilities with sanctions and allowing some time to implement security fixes on affected systems. Variants of responsible disclosure with strict deadlines have been adopted by major security research institutions. CERT/CC At Carnegie Mellon University and Google project zeroand has been adopted as an international standard ISO/IEC 29147:2018.
The disclosure of security vulnerabilities in blockchain technologies is further complicated by the fact that cryptocurrencies are not simply decentralized data processing systems. Their value as digital assets derives from both the digital security of the network and the public’s trust in the system. While their digital security can be attacked using CRQC, public trust can also be undermined fear, uncertainty and doubt (FUD) techniques. As a result, unscientific and unproven resource estimates for quantum algorithms breaking ECDLP-256 may represent an attack on the system itself.
These considerations guide the careful disclosure of updated resource estimates for quantum attacks on blockchain technology based on elliptic curve cryptography. First, we reduce the FUD potential of our discussion by clarifying the areas where blockchains are immune to quantum attacks and highlighting the progress already achieved toward post-quantum blockchain security. Second, we authenticate our resource estimates without sharing the underlying quantum circuits by publishing a state-of-the-art cryptographic construct called “zero-knowledge proofs,” which allows third parties to verify our claims without leaking sensitive attack details.
We welcome further discussions with the quantum, security, cryptocurrency and policy communities to align on responsible disclosure norms going forward.