Rob Behnke
April 27th, 2021
Blockchains come in a variety of different flavors, including public vs. private and permissionless vs. permissioned. These choices not only affect the blockchain’s ability to meet business needs but also the security of the blockchain system.
Blockchain systems can be classified in a couple of different ways. The original blockchains, like Bitcoin, were public, permissionless networks. However over time, the concepts of private and permissioned blockchains have emerged as well.
The choice between a public and a private blockchain impacts who has the ability to create an account on the blockchain network and use it. Public blockchains, like BItcoin, allow anyone to use them, while other networks restrict access to particular users.
Structurally, public and private blockchains are largely the same. Often, a private blockchain is simply an instance of a public blockchain that is set up within a controlled environment.
However, some blockchains are specifically designed to be deployed as private networks.
Blockchains can also be classified as permissioned or permissionless. A permissionless blockchain, like Bitcoin, allows anyone to perform any role within the blockchain network.
Permissioned blockchains, on the other hand, restrict certain functionality to particular users.
Permissioning can be implemented within a blockchain in a few different ways. In some cases, blockchains use a “pay to play” model to implement permissioning, where any user with a certain minimum amount of cryptocurrency is a masternode with special privileges. Under this model, the assumption is that privileged nodes will not misbehave because of the potential risk of losing their investments.
Other permissioned blockchains have privileged nodes selected by the creators of the network. While these parties may be “trusted”, this model increases the centralization of the network.
The various types of blockchains create very different security environments. With the choices between public and private, permissioned and permissionless digital ledgers come a wide range of security considerations.
Some of the major security pros and cons of different blockchain types include:
These are only some of the implications of the various blockchain models for blockchain security. The precise security impacts and tradeoffs depend on the details of the blockchain’s design. For this reason, a third-party security audit – designed to identify design flaws or oversights – is a crucial component of the design process for a blockchain system. Identify the different security risks your blockchain company may be exposed to by contacting Halborn at halborn@protonmail.com.