1 Management Summary
Cybersecurity today relies overwhelmingly on centralised systems and trusted third parties. These systems are essential for answering the fundamental questions “can I trust you?” (the trust dilemma) and “are you who you say you are?” (The identity dilemma). Yet these systems by their very design have inherent vulnerabilities. Centralised, trusted parties have their place in technology and society, in the foreseeable future it will simply not be possible to completely replace centralised trust with algorithms.
Blockchains and decentralised systems can offer some significant benefits to these traditional systems by adding mathematical proof to implicit trust. What will be more likely is a proliferation of hybrid systems which utilise a combination of centralised and decentralised technologies.