Unchained - Tor Bair of Secret on Why Private Smart Contracts Are Important - Ep.286
Episode Date: November 2, 2021Secret Network is a privacy-first, permissionless layer 1 blockchain built for computational privacy. Tor Bair, founder of Secret Foundation, a developer of Secret Network, discusses what makes Secret... Network unique, including smart contract privacy, private metadata for NFTs, and how regulators should treat privacy tech in blockchain. Show highlights: how Tor fell down the crypto rabbit hole what the Secret Network is and how it is bringing privacy to blockchain why public blockchains are problematic what makes Secret Network different from Monero or Zcash how Secret Network works from a technical perspective what type of applications Secret Network can support that public blockchains cannot why blockchain voting is probably a bad idea (for now) what attack vectors exist regarding Secret Network how Secret Network nodes work and why there are only 50 of them how Secret Network fixes miner extractable value (MEV) what DeFi applications are possible on Secret Network how NFTs on Secret Network are different from public blockchain NFTs how regulators should treat Secret Network Thank you to our sponsors! Crypto.com: https://crypto.onelink.me/J9Lg/unconfirmedcardearnfeb2021 Nodle: https://bit.ly/3AXGydJ Episode Links Tor Bair Twitter https://twitter.com/TorBair Website http://www.torbair.com/ Medium https://medium.com/@TorBai Secret Network Primers Messari: https://messari.io/asset/secret-network/profile https://messari.io/article/shhhhh-it-s-a-secret-network Decrypt: https://decrypt.co/resources/what-is-secret-network-scrt-formerly-enigma Coin Monks: https://medium.com/coinmonks/what-is-secret-network-bad9a233c481 Tech Crunch: https://techcrunch.com/2021/05/03/in-the-race-towards-web-3-financial-privacy-secret-network-attracts-backing-from-key-players/ Introduction from Enigma/Secret Article: https://blog.enigma.co/introducing-secret-network-ed48621754ad Video: https://www.youtube.com/watch?v=c70BBVUCxxk Tech Smart contracts → Secret contracts https://scrt.network/blog/programmable-privacy/ Upcoming Supernova upgrade (November 9) https://scrt.network/blog/supernova-explosive-vision-future-secret-network Secret NFTs (only the holder can view the NFT) https://scrt.network/blog/secret-opensea-partner-nfts-world-renowned-artist https://www.yahoo.com/now/secret-network-partners-opensea-launch-130000946.html SCRT Tokenomics https://scrt.network/blog/secret-network-tokenomics-and-ecosystem-pool https://scrt.network/about/about-scrt Secret Network block-explorer/node explorer https://secretnodes.com/secret/chains/secret-3 Ecosystem https://scrt.network/ecosystem/overview Graypaper https://scrt.network/graypaper Node information https://docs.scrt.network/node-guides/secret-nodes.html Enigma Original ICO `https://icodrops.com/enigma/ Research https://picoloresearch.com/upload/attachment/14614.pdf Enigma token swap https://medium.com/staky-io/how-to-swap-eng-enigma-to-scrt-secret-f80d855992ef https://blog.enigma.co/enigma-announces-settlement-with-sec-and-successful-launch-of-enigma-mainnet-3811ef291705 https://beincrypto.com/privacy-token-enigma-files-with-sec-after-settlement/ Learn more about your ad choices. Visit megaphone.fm/adchoices
Transcript
Discussion (0)
Hi, everyone. Welcome to Unchained, your no-hype resource for all things crypto. I'm your host, Laura Shin, a journalist with over two decades of experience. I started covering crypto six years ago, and as a senior editor at Forbes, was the first mainstream media reporter to cover cryptocurrency full-time. This is the November 2nd, 2021 episode of Unchained. My book The Cryptopians, Idealism, greed, lies, and the making of the first big cryptocurrency craze is available for pre-order on Amazon,
Barnes & Noble, Bookshop.org, or any of your other favorite bookstores.
Go to Bitley slash Cryptopians.
That's B-I-T-L-Y-S-C-R-Y-P-T-O-P-I-N-S and pre-order today.
The Notal Cash app makes earning crypto on your smartphone as easy as turning on your Bluetooth.
Notal Cash is private, secure, and available on iOS and Android.
Visit nodal.io-unchained.
That's N-O-D-L-E-O-O-S-Chained to start earning NodE-L-E-L-E-O-L-A-L-O-S-chained to start earning
nodal cash.
The crypto.com app lets you buy, earn, and spend crypto all in one place.
Earn up to 8.5% interest on your Bitcoin and 14% interest on your stable coins, paid
weekly.
Download the crypto.com app and get $25 with the code Laura.
The link is in the description.
Today's guest is Tor Bear, founder of Secret Foundation.
Welcome, Tor.
Hey, thank you for having me.
It's a pleasure to be here.
Tell us about yourself. How did you get involved in crypto and come to Found Secret?
Yeah, I got involved in crypto first as a speculative enterprise. I feel like it's okay to say that now that I've worked in it for so many years as a technologist.
But I started my career after college as an options trader and market maker.
And when you're an options market maker, what attracts you to something is volatility and chaos.
You want to see something that has people excited that moves all the time, but you don't really care if it goes up or down.
You don't really care what makes it work.
And that's how I got introduced to Bitcoin was as a hyper speculative product.
Nobody tried to explain to me what the technology did, how it could empower people.
It was kind of off my radar until I showed up at grad school.
So I went back to grad school after being a trader.
Trading really wasn't for me in the long term.
But while I was in grad school, I was lucky I went to grad school at M.
MIT for my business degree, and I took one of the very first blockchain courses that was taught there.
And I got really double lucky because one of the instructors of that course was Guy Ziskind,
who was doing research at the time on privacy solutions for blockchain.
So just years ahead of its time, these ideas that already seeing how privacy can be an
issue for blockchains, which I'm sure we'll get into.
But I was exposed to these very novel ideas in a very novel space very early.
So Guy is the founder of Enigma, this amazing development company, and I had the privilege of working at Enigma for a number of years as the head of growth.
And then when Secret Network was launched, I was able to leave and start Secret Foundation, which is an independent entity that also supports the network.
Enigma still remains the core developers for the network.
We have a number of other organizations supporting the network.
I would say a few dozen now of independent developers, node operators.
But yeah, my start was very much thinking that this was a fun thing to speculate on,
and it very much ended up thinking that this might be the one thing that could help us have a global revolution,
not just for how money is saved and spent, but also for how we engage with each other online
and protect each other online and actually protect our freedom and individuality online.
That's where I ended up, but it's not really where I began.
I'm okay to say that now.
And so tell us what is the secret network?
It's a layer one blockchain.
It's the only layer one blockchain to this point that has managed to integrate privacy
preserving smart contracts.
That's really the differentiator.
Otherwise, it's a layer one blockchain like an Ethereum, like a Solana, a smart contract network.
But what's unique about secret is that you can use private data as inputs, private data as
outputs, and you can have private state for the contract itself.
when you start thinking about what that actually means for developers and users,
it starts to seem like a really revolutionary concept,
because to date, every blockchain has been public by default.
What you get with Bitcoin, what you get with Ethereum is pseudonymity.
You have all these addresses.
People can't really say, oh, that address belongs to Tor.
That address really belongs to Laura.
People don't really see that on the chain.
But if they know that, if it's ever associated with your identity,
then it's the same as having your entire bank account and your entire credit history and everything
you've ever done financially public to everyone else. And when you're talking about a smart contract
application network, not just like a transactional network, it's everything you've done on any
application that's now public to everyone. It would be like if you leaked all of your Facebook
data all the time, not because Facebook sold it to somebody, but just because that was the way
that the application worked by default. So we thought if we are going to be able to be able to be
to have sustainable application ecosystems, these smart contract platforms that can do more than just
transfer money from point A to point B, privacy is even more essential to the user of applications,
even more so than their financial history. And we're seeing the consequences of a lack of Web 2 privacy.
We don't want to make the same mistakes with Web 3. We don't want users to suffer from that
consequence of not having privacy in the Web 3 world. Otherwise, all we've done is really build a way
worse version of Web 2, that instead of being more empowering, just becomes a perfection of
the type of surveillance capitalism that's already dominating the Web 2 world. And the way that we think
about it is we're motivated because we think it's a race against time. The faster we can get these
technologies to market, the more people we can protect, the more that we can show that there's
another path for Web 3 scaling and empowering people, not the public by default way, but the way that
really ends up with users holding the control in the system, not just the platforms.
So I understand just kind of on a gut level how, yes, once your wallet becomes public,
then everybody can see your history of transactions. And obviously, that's not ideal for anybody.
But are there specific problems that you feel arise in terms of transacting or, you know,
any of the other things that people do using blockchains that you're trying to solve with secret?
I would say everything that you do with a blockchain, you should assume is public,
you know, not just whoever happens to be looking at the time, but this becomes an immutable part
of your history forever. And that's not really the way that I think the digital world should
work. And it's certainly not the way that the actual meat space world really works.
You need to be able to leave control in the hands of the users.
And by giving up everything by default, all of your data,
you know, we already had this problem in the Web 2 world.
And we're just doing it again.
There's multiple companies that have raised now at multi-billion dollar valuations
for explicitly harvesting on-chain blockchain data.
And a lot of the latest startups in the blockchain space rely on further harvesting of data,
whether it's, you know, people's retina scans or something else.
Like so much of what I hear about just see.
like bad science fiction, and now it seems to be like reality potentially. That's, that's
really the problem that I see, not just what blockchain's already being used for, but how it
has the potential. Blockchain is just a tool. It could easily be used to take freedoms away,
having that type of prevailing surveillance by default. That really deeply concerns me.
And as blockchains get more utilized and as we start to see more real world use cases,
not just the things that feel like toys, but like real financial applications with trillions
in adoption, if blockchains are going to do that, I'm really scared for what that means for the
end user if the surveillance blockchain economy becomes the default.
Yeah, yeah, I was being interviewed for another show earlier today.
And it was one, it's not a crypto one.
it has more general audience. But, you know, when I was talking about the digital yuan, I had to
throw in there that also they were using it to surveil their, the users of the digital yuan,
which obviously, yeah, hopefully if the U.S. government adopts such a thing. Well, not even hopefully,
I know that they wouldn't do too much of that because there would be so much protesting. But anyway,
at this moment, we have a number of popular privacy preserving tech.
technologies and different processes in crypto, and it ranges from things that are kind of older,
like coin join to kind of newer things like ZK Snarks. So how does secret work?
Yeah, coin join and these types of, it's important to start with the distinction between
transactional privacy and computational privacy. A lot of what's existed and been scaled to date
in the blockchain space revolves around transactional privacy because the first blockchains we had all
focused around transactional use cases and all like in in the big bubble of 2013 i i hesitate to call
anything a bubble of course because where we are today is so much more advanced than where we are then so
clearly that wasn't a bubble it was just sort of an over speculation that turned out to be ahead of
its time but in 2013 these were mostly transactional coins and transactional platforms you know but then in
the next cycle in 2017 we started to get these smart contract platforms they weren't really used as much
mostly they were used to issue tokens, and then people speculated on the tokens, and then people
were doing transactions with the tokens. It's only this cycle that we've really started to care
about application-level use cases for blockchain between all these composable defy applications,
composable NFT applications. That's this cycle. So to date, most of what was built and optimized
and scaled were the transactional privacy use cases, the very trivial use case where it's just,
I need to send value from one destination to another destination,
I don't want all of the details of that transaction to be public to all parties on the
blockchain. That's how you got things like mixers. That was kind of the intention. What that
starts to sound like, if you're a regulator, right, is we created a platform for money laundering.
Transactional privacy is never going to sound good on paper. But what it really is just saying is
that nobody else should have the right to surveil all of my transactional activity unless I
consent to it, which in the real world,
world is true. But on the blockchain suddenly is false. But it was still clear that there was
tremendous user demand for that, not because they were necessarily doing something illegal, but
just because they wanted the same protections in the blockchain world that they already had
in the legacy financial system. Computational privacy is something different. And it really
hasn't existed up until this point because there wasn't even demand for blockchain-based
applications. But what computational privacy gives you is you can build an application that
uses private inputs, private outputs, and then, as I said, like encrypted state for the contract
itself. It's like if a transaction is the most trivial version of a computation, right? You're just saying,
here's my entire computation, move value from A to B. But it could really be anything. It could be
infinitely programmable. So we call computational privacy in our network. We also call it programmable
privacy because all of not only is the contract code programmable, like what should happen under what
conditions, we're also saying the data privacy and the access control is programmable.
So for us, the way that it works is we actually use a combination of software-based
cryptography solutions and hardware-based solutions.
The software-based ones are like key encryption, key sharing protocols, and the hardware-based
ones involve trusted enclaves.
So the same sort of things that are like in your smartphone, making sure that the part
of your phone processing, your fingerprint scanning, isn't.
the same part of your phone that's doing all of the other computation. It is just another form of
security. And by combining the two, we have a very interesting blockchain, one of a kind for the
time being, of course, but we expect that, you know, over time, many more blockchains may also
decide to embrace, like, privacy at layer one. But that's the two technologies we primarily use.
We can get into. It gets quite technical as to should you use ZK. Snarks? Should you use fully homomorphic
encryption, should you use secure multi-party computation. These are all different types of software-based
cryptographic methods that are used for protecting privacy. But what we chose to do was focus on,
you know, combining hardware plus software because we wanted to have a balance between performance
and cost and security. And ultimately, a lot of the pure cryptographic privacy solutions
are probably a decade away, at least from being usable in production for generalizable smart
contract use cases versus very narrow use cases like key management, let's say, where some of
these software-based methods are good enough. But that's not generalizable. That's just a very
specific but important function. All of this is essential. Every piece of the blockchain stack should
have some sort of privacy built in. So we support all privacy technologies. This is just what we chose
to use based on our purposes. And so tell me if I'm understanding this correctly, essentially
you're distinguished from things like Zcash and Manero
in more than just one way.
First of all, it's the fact that your privacy extends beyond
just transactional privacy.
But then on top of that, it's that the way that you provide
the privacy is through multiple methods,
not just through software encryption,
but also through the hardware.
Is that kind of a good way to...
No, that's completely correct.
and I might start explaining it that way.
That's a good way to think.
It is a good way to think about it.
And again, like there's so many differentiators for crypto projects out there.
And unless you're, you know, not just knee deep, but neck deep in the space, it is hard
to kind of get a handle on how these projects differentiate.
But ultimately, I do think that from an ethos perspective, we share a lot of Zcash's goals,
which is financial empowerment, user security, all of these things.
We have a lot in common with the project.
We just have a very different approach.
and we have a very different purpose at the technological level.
But that allows us to be great collaborators.
We definitely think ourselves as collaborators within not just the privacy space in crypto,
but the entire crypto space at large.
And so I'm sure you've probably heard that a lot of critics of privacy technologies
say that this is something that only criminals would want to use.
What do you say to that?
I've heard it all the time.
But, you know, I always think that, look, and then people are like, you know,
privacy is bad.
Like governments don't like privacy.
And then I say to them, well, governments love privacy.
They just don't love your privacy.
And like corporations love privacy.
They just don't love your privacy.
Like when Google and Facebook can build trillion dollar business models
based on exploiting user privacy, clearly, you know,
but at the same time they want to protect their own internal documents
because obviously it would be obvious that they're an unregulated monopoly or two or three.
Like they clearly care about privacy.
They don't want that public.
but they need your data to build their business model.
Like, it's just, it is really sort of, I find hypocritical to be able to say, like, privacy
when it's yours is bad, privacy when it's ours is good.
And a lot of the people advancing that argument about privacy is for criminals are
absurdly protective of their own privacy, and they certainly don't think of themselves as
criminals, even if they are participating in what I would consider to be criminal activity.
There's plenty of governments around the world that might say that private.
privacy as a tool of criminals while doing things to their own populations that I would consider
awful violations of human rights.
So first, we have to look at who's advancing the argument.
But there's certainly very reasonable people who still hold onto that belief.
And it's because criminals do use cryptocurrency.
And, you know, cryptocurrency is a tool.
Blockchains are a tool.
The U.S. dollar is a tool.
It's whatever the systems will permit that determine what happens.
and then the people using these tools within those systems
determine what happens with them.
There's not a good way to stop a criminal from using a technology
if they have access to that technology.
Criminals very clearly have access to the U.S. dollar,
and they very clearly use it for more money laundering purposes
than they currently do any cryptocurrency.
So I would say that just the availability of privacy technologies
does not create criminals.
And certainly providing privacy technologies
to law-abiding citizens does.
not make them criminals, nor does it make the provider a criminal. What it does is advance the cause
of security and empowerment for the end user, something that I would say governments don't do a
particularly good job at, but should. These are their citizens, and they should be protected.
And more often than not, I see that social contract really being broken. So I hope that people come
to see cryptocurrency as a liberating force, and more and more they are, rather than as a force
for criminals to get around perfectly good policy, I think especially when we look at countries
in the developing world, there is a revolution that's already started where people do see
cryptocurrency and privacy technologies as a way for them to become more empowered in some of the
most oppressive regimes. And that's what excites me about working in the space is thinking
that at some level these technologies make a difference to the people who need a difference
to be made the most.
Yeah, and disclosure for people listening, I do write a Facebook bulletin newsletter.
So speaking about this technology and how you are applying it in different ways, what are some examples of things that cannot be done with previous blockchains that you think are now possible with something like secret?
So I would say almost any useful application you can think of would be tough to achieve.
just with the current blockchain stack, with a public by default blockchain.
So a simple example is something like a Facebook.
You're trying to build some sort of decentralized social network.
Well, how do you want your access control to work right now on Facebook?
Right now you're going to go into your settings.
You're going to click a button that says, only share this with my friends.
Or maybe you click a button that says, don't share these details with advertisers.
If there's one thing I've learned about working at any of these companies,
and I used to work at Snapchat, I was a data scientist,
scientist at Snapchat. So I have some credibility in saying those buttons don't work the way that
you think that they work or they don't work the way that they would claim. The control still lies
in the hands of the platform and one failure on the part of the platform can cause all of that
security to be lost. That's the Web 2 world. In the Web 3 world, you don't have to wait around
for the platform to leak all your data or to violate your privacy. It happens by default.
If you wanted to build a decentralized social network on a public by default blockchain, like an Ethereum, for example, so much of what you'd have to do to create those access control permissions would have to be done on something centralized outside of Ethereum.
And the way that it looked for years is you're getting the worst of both worlds.
You have all of the usability problems of nascent bleeding edge Web3 technology and all the privacy problems of Facebook.
And that to me was not a better solution, just because it was like a different platform that wasn't Facebook, didn't mean it would eventually end up benefiting the end user more.
Now with a platform like Secret, you can build a platform on a decentralized blockchain, right?
There's all kinds of pieces to this Web3 stack, decentralized storage, decentralized access control.
All of these pieces of the stack allow you to build these more complex applications on top.
And privacy was just one of those missing pillars.
And we're providing that missing pillar.
But alone, you know, Secret isn't the only thing that's going to allow you to build these complex Web3 applications, just like AWS is not the only thing that allows you to build Web2 applications.
We're enabling a new part of the design space.
And in that design space, users will find more security, more usability, more privacy, and more control.
And that's what's been missing to date in blockchain was especially that aspect of control for, you.
users and developers who just want to do something even as simple as saying, this data should be
public to this party, but not this one.
As soon as it touches the blockchain, it's public to everyone.
And for trivial use cases, it doesn't matter.
But for meaningful use cases, as people are finding out, it really, really does.
Okay.
Yeah.
Yeah.
What you were saying about Ethereum, it makes sense because, like, I'm just thinking of an
ether scan.
Sometimes you look at a transaction and it looks like nothing happened, but then I can't remember what it's called.
Is there something called hidden transactions in EtherScan, but then you can see?
Do you know what I'm talking about?
It's like sometimes there are these transactions and they look like a zero, you know, whatever.
And then later on you find the area where actually you can see what happened.
So anyway, all of this is to say, yeah, by default, even when something like that happens, it is still something that you can see.
Yeah, it's all on the chain, regardless of like what's happening on a particular explorer, right?
There's all different ways to visualize the on-chain activity.
The chain is the source of truth.
Anything you try to do at a higher layer of abstraction above the chain, like you can obscure something within a centralized platform.
You can choose not to display something in the U.S.
But it's on the blockchain.
And once it's on the blockchain, it's public to everyone.
There's no way to get the genie back in the bottle, the cat back in the bag.
So these solutions have to happen, at least in our perspective, right, at layer one.
You need that layer one privacy.
And then on top of that, you know, the question then becomes scalability, interoperability,
the same questions that every developer has to think of when they're building a Web3
application.
But without privacy by default, you've really eliminated, you know, 99% of what I would consider
to be useful use cases.
Or here's an even better example.
How many times have you heard some of the same?
suggest that blockchains would solve our problems with voting.
I feel like every election cycle, somebody's tried to convince me that our elections
would work better. If only we could put them all on the blockchain.
Yeah, that is a terrible idea.
The privacy reason only being part of it, but like votes are not private on a blockchain
and they cannot be.
On a public by default blockchain, like you can cast your vote, but it's always attributable
back to you.
That's not how voting works in the real world.
Our votes are private.
We can see that somebody did vote, but we can't see the nature of their vote.
Like, that's what's public in the records.
There's probably very good reasons for that in a lot of public governance in democratic countries.
But on a public by default blockchain, we don't even give an application that choice of control.
You build on-chain governance and it's public by default.
Everyone's vote is public for eternity.
It's maybe good for certain aspects of accountability, but there's a lot of danger to making those votes public.
and you open yourself up to bribery attacks, which Vitalik has written about, and you open yourself up to all kinds of manipulation and vote buying.
I think that there's very good reasons to allow for private voting, and public by default, blockchains are not that.
So then are you saying that you think that actually voting on secret would be a good way to vote?
I'm not going to go as far as to say we should use voting on secret for Democratic elections in 300 million person countries.
But we do already have DAWs, for example, and applications on secret leveraging private governments where the outcome of the vote is provable.
You can say this many people voted.
This was the breakdown of votes weighted by stake.
And this is the outcome.
But you can't attribute each vote back to the individual address.
You could even see which addresses interacted with the voting contract and say these addresses definitely showed up, which is the same way that voting registries work in the real world.
You can see if somebody voted in the last election.
But if you go back and you look on a block explorer for secret, for example, you're not going to see for these on-chain applications that have private governance every single vote that was cast.
And I think that that is a good thing.
And it's working.
But there's all kinds of other reasons you shouldn't put like an election for a multi-million person country directly on a blockchain today.
I mean, what you should be doing is, you know, trying to solve other issues with identity that are really challenging.
challenging to solve. Sovereign identity is, or self-sovereign identity is one of the hardest
problems that exists. So that's more what I think we have to think about. But that said,
like there are immediate applications for private voting and we're already seeing them being
explored on Secret, which is exciting. So let's understand this security a little better.
As you mentioned, Secret relies on these trusted hardware enclaves. And you had told me previously
in another discussion that such hardware enclaves have never been exploited. But now that some of them
will be securing money in this fashion, I wondered if that incentive would make them more vulnerable
to attack. And I wondered, does that create some kind of single point of failure? Or is it that
the software element kind of reduces that? Because obviously with hardware, it's much harder to upgrade
than software. There have been times in Ethereum's history when they were undergoing a DOS attack or
something and they were able to roll out patches even within a matter of a few hours. But if there's
a vulnerability in hardware, then that takes quite a long time to resolve. And then I also went,
and so this is a two-part question because I also wondered, I don't know, like in those instances that I'm
thinking of with Ethereum, the fact that it was a multi-client network was kind of the saving
grace. And I didn't know, I know there's a very small number of validator nodes in secret,
but I didn't know if that was a model that you were aiming for, so as to assure up security.
I mean, these are great questions. And they are complicated. And the way I would start answering it
is to say that there is no such thing as bulletproof security for any solution, privacy or otherwise.
Everything ends up being a tradeoff. Lots of platforms will trade, you know, centralization for security.
would rather be more centralized in the short term, progressively decentralized, but allow themselves to have higher security properties in the short term.
And if you start off with some idea of perfect decentralization, you know, what that sounds like to me is you've balanced a bunch of stones, you know, with the smallest one on the bottom and the largest one on top.
Like you're just hoping that nobody shoves the largest one off first.
It's not necessarily sustainable.
And a lot of what we care about is sustainability.
But we also care about generalizability.
we care about programmability.
So the solutions that we're using today,
this balance of hardware technologies and key sharing technologies,
that's a deliberate architectural choice,
not because it's perfect,
but because given the available technologies,
it's the best we can do
while preserving user security,
the end user experience,
generalizability.
We could have other choices
where we make things even more centralized
and will improve performance.
We could have a solution where
we support more types of hardware
in the short term, but it would open up the attack surface more broadly to enable that type of
broader support, especially when a lot of that is nascent. There is no way to completely eliminate
the incentive for people to attack any type of blockchain network, especially the more that it
secures. There's always incentive for somebody to attack the contracts that exist on the network,
even if they're not compromising the hardware that secures it. And that's true for any blockchain.
And you constantly see D5 protocols getting exploited. So that incentive, that incentive,
kind of always exists. There's no way to fully eliminate it. But what you can do is at least
try to make deliberate choices based on the best available technology. And the reason we put so much
money and time and people into research and privacy research and these like new technologies
that are arriving. And the reason so many people in the blockchain space share that research broadly
is so that these types of better solutions get socialized faster. So if there are better technologies
that we can put to work in secret.
Secret was built to flexibly enable new types of hardware support and encryption.
We want it to be a privacy network that gives choice to developers and gives choice to users.
If something better exists and we can implement it, we will.
And in the meantime, to your first question, we can't eliminate the incentive for somebody to try to exploit the hardware.
But certain aspects of the network are the network making a best effort to protect itself.
For example, for any patch that already exists, even for the ones where they're not really
required or recommended, all those hardware patches must be installed for a node to register
with the network.
It's an even higher bar of security than I would think in most Web 2 or any Web 2 application
that relies on the same sort of trusted hardware technology.
It's an even higher bar than that because it's a permissionless network.
You have to take more precautions as a permissionless network when you're requiring people
to connect to the network with a hardware-compliant note, that bar becomes even higher.
And of course, you know, you do require for any of these speculative attacks, like,
they require direct access to the hardware itself to perform.
So in a decentralized network, you also mitigate some of that.
But again, I don't want to have it come off at this point in the podcast that there's some
idea that I would be promising perfect security or the elimination of the attack incentive.
What it is is just a lot of people.
people making a best effort with technologies.
And before we start, you know, asking people to put their, you know, U.S. election votes
on the blockchain or secure their social security numbers or do things of that level
of security, understand that if you are choosing to engage with these networks, they're
bleeding egg technology.
As long as people understand what they're getting into and what the tradeoffs can be,
it's a very exciting space to build in if your expectations are sort of set appropriately
for what that means.
But it is, it is some of the best and most ethical people, at least I'm.
I've found working in the world on these types of solutions within our network.
And that gives me a lot of confidence that we're doing as well as anybody can to address them.
So in a moment, we'll talk a little bit more about security and also other fun applications of Secret Network.
But first a quick word from the sponsors who make the show possible.
With over 10 million users, crypto.com is the easiest place to buy and sell over 90 cryptocurrencies.
Download the crypto.com app now and get $25 with the code.
Laura. If you're a hodler, Crypto.com earn pays industry leading interest rates on over 30 coins,
including Bitcoin, at up to 8.5% interest and up to 14% interest on your stable coins.
When it's time to spend your crypto, nothing beats the Crypto.com visa card, which pays you up to
8% back instantly and gives you 100% rebate for your Netflix, Spotify, and Amazon Prime subscriptions.
There is no annual or monthly fees to worry.
about. Download the critbet.com app and get $25 when using the code Laura. L-A-U-R-A. The link is in the
description. Bet mode activated. The scorebed app here with trusted stats and real-time sports
news. Yeah, hey, who should I take in the Boston game? Well, statistically speaking. Nah, no more
statistically speaking. I want hot takes. I want knee-jerk reactions. That's not really what I do.
Is that because you don't have any knees? Or...
The score bet. Trusted sports content.
seamless sports betting. Download today. 19 plus, Ontario only. If you have questions or concerns about
your gambling or the gambling of someone close to you, please go to conixonterio.ca. With Amex Platinum,
you have access to over 1,400 airport lounges worldwide. So your experience before takeoff
is a taste of what's to come. That's the powerful backing of Amex. Conditions apply.
With nodal cash, you can earn crypto on your mobile device for free with no hardware to purchase.
You just download the Nodal Cash app, turn on your Bluetooth, and start earning.
Notal Cash is private, secure, and easy to earn, whether you're on the go, stuck in traffic,
or even while you're sleeping.
You can even repurpose your old smartphones to earn Nodal Cash.
Visit nodal.io slash unchained to get started.
That's NODLE.com.
Join the Citizen Network to earn crypto on your smartphone 24-7.
Back to my conversation with Tor.
So as I alluded to earlier, there are only 50 secret notes in the active validator set.
And I wondered, could that be another security failure?
And I realized in secret, it's not the 51% attack.
It's the 52% attack.
Yeah.
For us, the way that it works right now is that there's 50 nodes that are considered to be in the active set, meaning they can produce and sign the next.
block on the network. That's actually managed through governance. That can be increased. And with the
upcoming supernova upgrade, that's actually one of the things that's most actively being discussed in
on-chain governance is should the cap be raised. And the idea is over time, that's progressive
decentralization. That's the approach a lot of projects will take. And these nodes are not
operated, like it's not 50 nodes being operated by a single entity. These are 50 independent
entities that have to participate in governance to make these sort of decisions on behalf of the network.
have about, I think the current number is like 20,000 delegators or something like that in the network
who are actively voting. And these are not, you know, one person with 20,000 accounts. These are real
users. So it's a very decentralized governance methodology for people to say, okay, well, it's time to
raise the cap. And it's time to decentralize. And, you know, Supernova gives us some confidence that
we're ready to take that step as a network. And then we can raise the cap even further, you know,
70, 80, 100 nodes. You know, over time, the idea is this improves. There's also like side chain and
second layer solutions that could be even more decentralized, but we still treat this as the base
layer of the network, right? All of these are possibilities in the future, just like Ethereum is getting
its own L2 solutions very easily. So could secret. And with IBC, which is this interoperability
protocol that exists in the cosmos universe, you know, now actually a lot of these chains will be using
each other as like second layers for security and second layers for computations. Like it becomes sort of like a
mesh network of blockchains.
So it's really exciting to see this evolved to date.
Like this is not really something that we've seen working in practice.
All of this is highly experimental.
But, you know, some of the biggest blockchains in the world have an even more centralized
model than this, right?
Like, finance smart chain has like 20 validators or something like that.
And that's one of the, you know, one of the blockchains in the world that secures the most
value.
There's other networks where they have, you know, very centralized models for bridging
between chains. Like at some degree at every point in some network stack, the way that things look
today, everything is centralized. Everything has points of failure. Everything has points of
decentralization. For us, you know, 50 is actually quite a lot for what we're asking the network
to do, especially since they're operated by independent entities and permissionlessly managed by
the network. But, you know, when you hear 50 and you're an end user, it doesn't sound as decentralized
as it could be. And that's what we're working towards is continuing to decentralize the network.
But as we said, decentralization always has a trade off with performance, has a trade off with cost,
has a trade off with security. And as we expand the nodes in the network, like you have to be very
cautious and cognizant of those costs. But if you are, you know, I think, I think as a community,
as an ecosystem, people will make good decisions about what the network is ready to actually
support. Okay. So it sounds like we may see an increase sometime soon, but generally over time,
you will try to increase that number based on the performance of the technology. Yeah. And to be clear,
anybody can still operate a node in the network and operate a full node in the network. It's just the
50 nodes that have the highest stake in the network are in the active set and can actually process
the blocks and fuss earn the rewards. So like other proof of stake networks, there is an incentive to have
nodes and attract delegations and self-delegate your own coins just to increase network security
because that increases the costs of attacking a proof-of-stake network, you know, to have a lot
of the stake in the network distributed and bonded. That's the security property that matters the
most for proof-of-stake network, is that level of decentralization and having a high number
of the available supply of the coin actually be staked and not moving and locked up for
like a certain period. For us, it's a 21-day period of bonding in the network. If you choose to
unstake, that's how long it takes to stop. Those security properties are really essential for
convincing developers, like this network is something you can rely on for your own applications.
So that's the other trade-off to consider here is this is a delegated proof of state network.
It incentivizes new nodes to join the network, attract delegations, increase the bonded rate,
and that just becomes part of the economic game theory that helps create the security for the
network.
So let's now talk about defy. Obviously, that has been something that has taken off on Ethereum,
you know, probably restricted a little bit by fees and scaling there. But on something like
secret where there's this added, you know, feature of privacy, what are new types of defy
transactions or smart contracts or protocols that are possible in secret that would not be possible
on Ethereum or another public blockchain?
Yeah, so with Secret, the big thing that we think about is, I guess for Defi, one major thing is front running, which again, gets a little technical, but I think people listening to the show has probably heard this term before.
The idea that miners on Ethereum and other public by default blockchains, they effectively can see the future.
They see what the transactions are going to be before those transactions actually come to be.
And there's this concept of minor extractable value, that the miners, the blockers, the block.
lock producers in the network are always able to capture value from the applications built on the
network because of that ability to see the future. And in Defi, I think there's been some
calculations down. I think it's gone well into the billions of value that has been extracted by
miners. And it's a huge cost. I might also make the argument that it's somewhat not legal in the
real world to be a frontrunner. It's actually front run transactions on the chain. And what does it mean
that a minor even has the capability to do that, is that compliant if a minor can front-run
transactions in the network. So one of the things that you get with defy applications built on
secret network is this idea of front-running resistance by default. Because the validators in the
network can't see the interactions coming in for them to process, they can't see them because
they're encrypted. They get decrypted only inside the enclave. So effectively, the nodes don't
know what's happening until they've already done it.
And that means they don't see the future anymore.
So they can't do all these sort of injection attacks where they can put their own transaction ahead of yours or the sandwich attacks or any of these things in the Ethereum ecosystem that people are solving through very complex and very centralized means of solving these issues.
You sort of get that resistance by default in the secret universe.
So that's one aspect.
And that happens at the protocol level.
So any defy application built on the network benefits from that property.
But the other thing that you get is you do get privacy for the input data and output data of the applications.
So for example, if you wanted to build a dark pool application or you want to be able to, this is a massive application in the real world.
Even though it sounds kind of nefarious, this is actually driving trillions of dollars of economic value around the world if you work in a major bank.
Darkpools are a big deal.
But even in the blockchain world, if you were to have a dark pool application, really what that means is.
means is you can transact with people, but the orders are not always public. Transactions will just
sort of happen when there's when there's two orders that are sort of matched against each other,
but you don't have a public order book. You can build those types of private applications on
secret network quite easily because of the programmable privacy controls. But it begs the question
of, well, if everything is private, private defy, I don't know if you were going here, but how
compliant is that really going to be? My answer to that is always that actually the programmability of
privacy is the solution to that, because what you could do is build an application on secret
where you white list addresses. There is some sort of off-chain verification that needs to occur
to say this compliant entity that's now interacting with this dark pool. We know that this is a bank,
so they're using this dark pool application. But you still can't see the orders. The data is private,
but the identities of the people participating in the system are known.
So now you have compliant defy that's decentralized,
but you don't need to make everything public in order to use it.
There needs to be a balance between auditability and accountability
that you can get from that white listing process
and being able to protect the security of the applications themselves
and the security of the data in order for this to be usable
either by institutions or by retail users.
That's kind of essential.
and only with the added flexibility of programmable privacy, can you build those types of applications?
Otherwise, the choice on Ethereum is the same choice for everyone.
Expose everything or don't build it at all.
And to me, that's not choice.
That's just restrictions.
Yeah, that's so fascinating.
When you were describing that, I immediately realized that there's an opportunity there for something to be built,
somewhat similar to what Paxos is building where they're doing that enterprise blockchain
for different financial players to trade stacks and have a lower settlement time.
But this, you know, I think, yeah, would be something that then you wouldn't have to have a
company necessarily at the center that was managing it all.
So it sounds like a business opportunity for somebody out there.
We would love for people to build these types of.
of things on Secret because, again, we're trying to do this the Web 3 way.
I'm using finger quotes for those listening on audio only, but, you know, the Web 3 way being
more decentralized, more permissionless, more end user access, you know, anybody can run a
node, deploy a contract.
There's a lot of ways to solve a lot of privacy issues if you gate it, if you put it
inside a fully permissioned chain, right?
Like, to me, I say permissioned versus permissionless because private versus public is a little
misleading.
Secret is a permissionless network, but it has privacy.
And if you build a permissioned blockchain that only certain people can use, only certain
people can read, a lot of those use cases I personally feel are better served with some
sort of other sort of distributed database technology.
Why use a blockchain?
Why put a coin on it, right?
But, you know, those are really valuable use cases, but the same way that institutions
are starting to lean towards the public Ethereum chain for actually,
building and deploying their applications and participating in governance on Ethereum,
as opposed to like really chasing down a lot of these enterprise ledgers.
That's been our thesis all along.
We just also think that privacy should exist in that Web3 world, not only in the permissions
chain world.
We're trying to be that center of that Venn diagram.
And ultimately, I think enterprises, institutions will understand what that means for them.
They will choose the Web 3 solution.
They won't choose the total Walt.
garden when they realize that these types of applications really are possible on a
permissionless chain. Yeah, we'll have to see what time frame that happens on, or if at all.
So another thing that you and I had previously discussed was NFTs on secret.
And I'm curious to hear you describe how NFTs on secret would be different. And then I have a
question for you after that. Of course. So NFTs on secret, it's not just a hypothetical, right? Like
everything we're describing now, this is not someday on Secret.
Like, Secret has been on Mainnet for about a year and a half with privacy preserving contracts
for about 13 months.
So I probably should have emphasized a little more strongly that, you know, we're having
this conversation because these aren't hypotheticals, because the technology does exist
and people are using it.
So we do have defy applications built on secret.
You know, we do have AMMs and Dex's built on secret.
We have a lending platform being built.
We have a stable coin being built on secret, all with these front running,
resistance and privacy preserving properties. So similarly with NFTs, this exists. You can deploy
NFTs on secret, just like you can deploy an NFT on Ethereum, just like you can deploy an NFT on
Solana. But as we talked about with the defy side, yes, things work a little differently on
secret, but in a way that again expands the design space by orders of magnitude. The biggest difference
for secret NFTs is twofold. One is you can have the choice between public,
or private ownership.
And the other is you can have a choice, or you can have both, between public metadata
and private metadata.
So whether you're familiar with NFTs or not as a listener, an NFT is a very simple concept.
It's this digitally scarce item that lives on a blockchain.
So anybody can really deploy one.
You can interact with it, but it exists on the chain, not in like some centralized platform.
And it's scarce, as opposed to fungible.
tokens, you know, like ERC20s on Ethereum. These are non-fundable and they're designed to be
scarce one of one, one of 10,000, but like really identifiable. The difference between, you know,
having a dollar bill and then really caring about the serial number on that dollar bill. That's
the difference between fungible and non-fundable. So on secret, we care about non-fungible
quite a bit because for scarce items, private ownership is actually super important. That is how you,
immediately reveal somebody's identity when they may not want it to be revealed. If you own one
of, you know, 10 million Ethereum and it's completely fungible, it can go through applications,
it can go through mixers, eventually, like you can't really see what happened at all. But
that's the fungibility with a non-fungible asset like an NFT. And if you can assign somebody's
real world identity with ownership of that NFT, then you now know that that address belongs to
that person forever. And that is a very big security risk, especially
if you're a big collector.
Or as a creator,
maybe you don't want to put your audience through
that sort of process
to be able to engage with your work.
It limits your audience if you have to say
you have to make everything about yourself public
in order to own this work.
But the private ownership piece to me
is not nearly as interesting
as the private metadata piece.
So what that means is the way NFTs work today,
all metadata is public.
So if you own an NFT,
if you have, let's say, a crypto punk,
it sits in your Ethereum wallet.
You own the QT,
to your wallet, so technically you own that
crypto punk. What you really own
is a contract that
points to a
file that sits in distributed storage.
And I've heard some people kind of
describe that type of digital ownership as like,
I forget who did this. I loved this analogy
because I thought it was so funny. It might have even just been a tweet that I saw.
But it's like if you go to the Louvre
and there's a guy standing outside the Louvre
and he hands you a small piece of paper that says
you own the Mona Lisa.
and then it's like, wow, I own the Mona Lisa.
He's like, yeah, that'll be 500 bucks, so you pay them.
And then you go inside, you try to take the Mona Lisa off the wall.
You're going to get tackled or shot.
You don't really own the Mona Lisa.
You just own a piece of paper that says you know where it is and somebody somewhere
recognizes your ownership of it.
But what do you really own?
Anybody can go look at it.
You can't really move it.
It's tough, especially when the art, that public metadata is public to everyone.
Like we've been saying, that's how public by default blockchains work.
With Secret, you finally have the ability to put both public metadata and private metadata in that NFT contract.
So as an artist, for example, you could put a watermarked version of your high-quality art piece in the public metadata.
Anybody can see what the NFT now represents because it points to that work.
But only in the private metadata, do you have the full resolution, non-watermarked, high-quality version of it, and it's only decryptable by the owner.
So now only that owner can choose to display it.
Only that owner could show it off, let's say, in a physical gallery.
And only that owner really truly benefits from that content.
That's a much more accurate representation of real world ownership.
That feels a lot more like the Mona Lisa sitting in your house.
And only if you invite somebody over here to your house, are they going to see your Mona Lisa?
But you can still, with the public metadata, if everyone knows that it corresponds to that scarce digital asset, you still get the flex, right?
you still get to say, I own this.
And that's such a big piece of what to date NFTs have been about.
But what we want NFTs to be about is creator empowerment, creator monetization.
We don't want the NFTs to just be about, look at this cool cartoon I own.
We want it to be like, I'm a creator.
I made something of value.
I want to share it with my audience, but only my audience.
It's a path to monetization and sustainability without a middleman.
Because, again, this is all just Web 3-based access control and native privacy.
So I'm a musician.
So I've always been very excited about creating these use cases on blockchain.
And the biggest blocker has always been the lack of privacy controls and access controls.
And I finally feel like with secret NFTs, there's a solution that I'm comfortable saying is decentralized, but also works.
And that I have comfort, like if I put my work in a secret NFT, it would still have value years from now instead of somebody just, you know, right click saving to their computer and pretending like they have.
ownership all along.
Okay, okay.
You answered my question because in our previous discussion, you said, oh, an artist could,
or a creator could put the NFT in the private metadata.
And then it's really just that collection will get to enjoy it.
And I was thinking, oh, but, you know, as you said, NFTs are all about the flex, the status
points.
So, okay, but so then they can still get that.
Well, so the day this show comes out, you will be announcing a partnership with OpenC
and an artist who we cannot discuss on the show.
But why don't you tell us a little bit about that?
Absolutely.
And it kills me that as we're recording this,
I don't have permission to share the artist's name,
but it's somebody that I hugely respect.
And at the time people listen to this,
they'll understand why we couldn't discuss it in advance.
But this is so exciting for us
because it's the first time that there's been an artist
looking at NFTs and saying,
I can't use this.
I can't protect my work.
My work has such immense value to me.
It's so scarce.
This is never before seeing content.
No one has ever seen this but the creator themselves.
This is the first time anybody in the world will see it,
and it will only be accessible to the owner of it.
But there will also be a public metadata component
so that everybody knows what it represents,
and everybody will have known who created it,
and it will still look beautiful on the outside.
But on the inside, even more beautiful, even more special.
You can think about it as a one-of-one
that nothing like it has ever existed
and nothing like it will exist anywhere else.
And this is a mainstream creator.
This is somebody from the real world
who came and looked at NFTs and said,
this makes no sense.
But then came and looked at secret NFTs and said,
this makes so much sense.
And I can use this.
And it's just another way to connect with my audience,
my existing audience,
and maybe build a new one.
I'm so excited for who it is,
but I also would say,
like, I don't really think
it matters for the purposes of this conversation about secret NFTs, who exactly it is, because
you can think of a hundred people right now who this could apply to, where it would be like,
oh, I would love to consume that person's work if it meant a personal relationship with that
creator. You can imagine a creator putting access to a private community inside the private
metadata. So only the owner of that NFT can access it, but nobody else even knows where that
community lives. And you can't just check on the blockchain to see who else is in the community.
It's a private community of owners, bound, box.
ownership of that NFT interacting directly with the person who originated it.
These are such exciting communities that can form.
And I don't think you need to bring, like so much of what's been tried in the NFT
spaces, you're somebody who's famous.
So you're going to bring the 10,000 people who already know you into the blockchain,
convince them to buy something of your work, and then check out forever.
It's a cash grab.
This, what we're doing with this creator, what we're doing with OpenC, like, it's whatever
the opposite of a cash grab would be.
It's the only time that this person's even been able to share their work in this way.
So there's no other way to do this.
There's no other way to share this in a way that this creator would be comfortable with,
except for the way that we're able to do it with the private metadata.
And we're excited to partner with OpenC because they can auction this NFT on their platform.
It's going to be an Ethereum NFT.
But what it's going to do is owning that Ethereum NFT now unlocks access to the secret
NFT. The secret NFT is really like the settlement layer of that NFT. Access to the Ethereum
NFT gets you the secret NFT inside the NFT, that treasure chest, you open it up inside the
NFT is that meaningful piece of scarce content never before seen by anybody else wrapped up inside
of it. So you don't even need to, you can take all of the liquidity and demand that already
exists for these Ethereum platforms. And all of that demand can still lead back to,
to a secret NFT, just because you can bridge between the networks.
You can bridge from Secret to Solana.
You can bridge from Secret to Near all these incredible protocols for NFTs that have incredible
artist and creator and collector communities.
But none of them have private metadata at Layer 1.
None of them have that native access control or private ownership.
So even though we're going to be fully interoperable, and even though we want these to be
multi-chain NFTs, we do believe that Secret is best positioned to be that settlement layer.
and appeal to creators who want to keep their work secure and want to ensure that wherever it
really like would live and where users would choose to interact with it to gaze into the private
metadata, we still think that will be secret because creators will demand it,
because collectors will demand the security of private ownership.
But it won't mean that we don't have NFTs on other platforms. All it means is we've now
created more security for every NFT that could exist on any other chain.
It's really interesting because it does mirror real life art collecting more. So I find it really fascinating. Let's switch tax a little bit. One thing is, as we all know in crypto, regulation is a big story right now. And we have seen that regulators seem to be trying to push things toward a more centralized model that does rely on intermediaries away from a decentralized peer to peer model.
And I have talked with some different entrepreneurs in the space who, to their mind, they don't
necessarily agree with the government's approach here. And for them, they think that the best way
for regulators and law enforcement to deal with the crypto world would be to have the public
blockchains where you can see the flow of funds. But then, you know, through the on ramps,
which are, which do have know your customer on them, that,
that would be enough for law enforcement.
And as we've seen, there have been many cases where law enforcement has been able to identify people and, you know, go after them.
You know, for something like Secret, though, that model wouldn't really work.
So how would you suggest that regulation handle a setup in which Secret was a big part of the crypto world?
I think that Secret, again, these are very interesting and challenging and deep questions.
These things don't have simple answers.
I might argue that that's simultaneously too much and not enough.
It's not enough to have that kind of oversight.
Because what if all of this value ends up never going back to the Fiat world?
What is valuable to people is really just access and control and they find it natively on Ethereum.
They never cash out.
They just turn all of their Ethereum into Cryptopunks.
And what Cryptopunks unlocks from like a flex perspective with so much more valuable to them
than going out and trying to buy like an actual Lamborghini,
we really are entering a world where maybe none of this money ever needs to go back into the legacy financial system to provide maximum value to their holders.
And you can imagine a ton of people in the crypto space sitting here and thinking, actually, yeah, I'd rather flex my crypto punk than go buy a car.
I mean, people still need to eat.
They still need to live somewhere.
But maybe your needs are not that complex.
Is it really, you know, but I agree with you that, like, eventually getting back to like fiat money, you know, and that necessity that could.
slow down or prevent like a lot of criminal activity. I'm very anti-criminal. I want that to be known on
this podcast. I very much do not advocate for things that like especially things that like are
harming people, real people. Like that's that's real and I and I don't want to play it down. I'm just saying
like simultaneously like this isn't going far enough as I said, but maybe it's already going too far.
That level of surveillance is not warranted and it's treating everybody as a criminal before they
become one. Where is the consent from the user? Right.
with secret, what you have is a viewing key system or a permit-based system where if you choose
to share access with someone as a user, if law enforcement comes and asks you to share, you know,
and you refuse.
But how will they find you?
How will they find?
So, I mean, again, like, these are all, how are they going to find the owner of an Ethereum
address, right?
If we're talking about the on-rants and off-ramps, right, that's different, right?
And Secret Network is not an on-ramp or an off-ramp.
If an on-ramp or an off-ramp chooses to support Secret Network, they're doing it.
because they believe this has a value as a platform to their users.
And buying Secret, one thing I should stress for people who haven't interacted with the network,
secret itself is not a privacy coin.
We talked about Monero.
We talked about Zcash.
If you go and send Zcash from Monero around the network right now, yeah, that's a privacy coin.
It's not traceable.
Secret, the native coin of the network, what pays for all the gas, what you stake, what you vote with,
the coin at the network level is public.
And that's a deliberate design choice for the network because that type of transparency is useful
for auditability and transparency and accountability.
And it's also useful for exactly the types of things that you're describing, like where you want
to see what use cases are active in the network.
But all that privacy exists by default at the application layer.
And what that means is if you build something on top of secret, we talked about these
whitelisted applications, right?
A whitelisted application on secret would require only KYC'd accounts to be able to interact
for those applications. And if there was an application that was not using that system, and for some
reason, it became required that you had to be a KYC'd whitelisted address to be on the platform,
you wouldn't be banning secret network. There would be noncompliant applications.
But fundamentally, I don't believe that that sort of censorship should exist at the network level,
because all you're doing is compromising the security of every compliant application by forcing it
to be on a public by default chain. So there's a false choice, really, between, and I'm not saying
you're presenting me with a false choice, but I think regulators or law enforcement would present us
with a false choice of either you can have, you know, a public by default blockchain with
absolutely everything traceable, which they will love, but is way too much, way too much surveillance
and extremely invasive. You know, if the false choice is between that or like you can't have any
application that has any element of privacy whatsoever, that's an insane false choice. And honestly,
regulators prefer privacy. Like, why else would Facebook be fine, build?
billions of dollars for all these like data leakages.
Like what happens to Experian when they leak all of your social security numbers?
What happens to accountability for Uber where their database gets exploited?
Like there have been fines for exactly that type of like lack of data protections for
consumers.
And like this is why GDPR exists.
Privacy really is valuable.
And regulators should prefer platforms that provide privacy at the application level.
All we're saying is don't enforce a lack of privacy.
at the network level.
This is the same thing about like forcing backdoor encryption into like every application.
All that does is create exactly the thing that criminals are going to exploit.
Anything that gets created as a backdoor is going to be exploited not just by the good guys,
but absolutely the bad guys.
And sometimes much sooner by the bad guys than the good guys.
So all this is saying is don't force blockchains to be completely insecure at the network level.
If you have to apply controls, it should happen at the application level.
That's the reason we chose the architecture for secret.
And I think it's completely compatible with the version of the blockchain world that regulators would like to see exist.
I actually think it would be substantially more preferable.
But we're early in the education process, I'd say, all the same.
So for Secret, obviously, you know, there is kind of a unique feature here that could draw a lot of people.
You know, it offers something new.
But also, what would happen if Ethereum or another bigger blockchain were to,
either adopt some, you know, form of secret, whether it's in an application on top of Ethereum
or whatever it might be, you know, like how do you kind of compete in that regard? Or is it
just that you've created this Ethereum bridge so that that way it doesn't make sense to do that
anyway? So if you have an application that just requires like privacy for a purpose, we're built
to be interoperable. And actually what IBC allows us to do, that that's a bridge not to Ethereum,
but every other Cosmos network.
So that includes things like Cosmos Adam, things like Terra, things like Akash, things like
Sentinel, all of these different IBC enabled chains that are able to talk with each other
today for just transfers, but also soon for contract calls.
That becomes more like you're describing, like Secret now serving as a second layer to these
other blockchains that just want to do some private computation.
So Secret provides that as a service, as another layer.
But the bigger point that you're raising is why doesn't like I feel like everybody always gets this question.
Why can't Ethereum just do what you're doing?
Right?
Like this is a bigger chain.
It's a bigger ecosystem.
More devs, more this, right?
And it's a valid question if you're asking like an avalanche or a polygon or one of these other chains that seems to be much more directly competitive.
But the fact is when you start as a public by default chain, you can't put the cat back in the bag.
It's public already.
When you start as a private by default chain, you can always choose to reveal something.
And if you don't reveal it, it's still private.
If you do, now it's public.
But you started private and you had a choice.
With a public by default chain like Ethereum, you can't slap something on someday that
would suddenly turn the entire history of the blockchain private.
And you certainly, like, the larger the network is, you certainly can't like convince
the entire population supporting that network to embrace privacy by default,
especially if there's stakeholders in the network who don't want that model.
there's not only like a technical debt here.
There's a governance debt.
And the entire network has to agree on this purpose.
With Secret, you know, we care about privacy.
You know we care about privacy because if you're watching the video, we put it on all of our hats.
And you get privacy by default.
Thank you.
They were very popular in Masari Mainnet earlier this year.
We'll be bringing them back for NFT, NYC, and to Cosmoverse in Lisbon and in Miami in November.
So if you like privacy, we have hats for you.
But the point is, you never have to ask somebody in our community, hey, do you value privacy?
It's the one thing that, like, really binds our community together by default.
We actually have a lot more cultural cohesion as a result than an Ethereum where I don't even
think some of the core devs of Ethereum can agree on what Ethereum is for or what its ethos is.
And that's okay.
Like, it's been a world computer.
It's been an ICO platform.
It's been an NFT platform.
It's been a D5 platform.
You know, but it's never, like, had necessarily.
necessarily a strong identity beyond that. With Secret, we know what we stand for because we do the
thing that other public by default, you know, blockchains don't do, which is protect privacy by
default. So the short answer to the question is really just you can't do this. You can't take a
public by default blockchain and slap privacy on top. The same way that like public private
key key only works in one direction. If you have the private key, you can unlock the wallet,
but you can't take the public key and somehow guess the private key. It only works one way.
So it's the same thing. You can't turn all of a thing. You can't turn all of a
Ethereum private now that it's public. But with Secret, once it starts private, there always
remains that choice to reveal anything on the network, anything about an individual application.
So there's always the chance in the future that will be more like Ethereum. But there's
never really a chance that Ethereum's going to end up more like Secret.
Okay. Great. Well, this has been a super fun and just, yeah, really stimulating discussion.
Where can people learn more about you and Secret? To learn about Secret, you can.
can go to the homepage for the network. It's hosted at scrt.network. If you want to follow the network
on Twitter, that's at Secret Network. If you want to follow myself on Twitter, I'm at Torbert. My first
name, last name. It turns out there's not that many of me. So I'm fairly easy to find across most
platforms. And yeah, that's the best way to keep up on network news. If you want to find us in
person, as I mentioned, we're as this episode is coming out, going to be at NFT, NYC, will be in New York,
finally being able to share this news,
and I apologize again
that we weren't able to share it on this podcast,
but I think we were able to go into so many critical details of the network
that I actually think that this is possibly the best podcast
we've been able to do to date,
explaining the values of the network,
explaining the properties of it,
and I know that it's just going to be as important of a listen
a year from now as it is on the day that this is going to air.
So I really appreciate the opportunity,
and I hope that anybody listening
who shares that ethos and cause of privacy
we'll look into the network, become a secret agent, the core of our community, and work with us to
advance this for the whole Web3 space.
Great. Well, thank you so much for coming on Unchained.
A pleasure. Thank you.
Thanks so much for joining us today. To learn more about Tour and Secret, check out the show notes
for this episode. Unchained is produced by me, Laura Ashin, with help from Anthony Yun, Daniel Nuss,
and Mark Murdoch. Thanks for listening.
