BackstopWhitepaper Draft0 2
BackstopWhitepaper Draft0 2
BackstopWhitepaper Draft0 2
arbitration systems
Draft 0.2
Abstract
We describe a design for an L2 ledger with an enshrined dispute resolution
oracle. Contracts deployed on the ledger benefit from oracles and governance
arbitration backstopped by the ability, in extremis, to fork the entire L2 ledger
on which they are running. Decisions about assets issued on the forkable ledger
benefit from "subjectivocratic" security. Tokens bridged from other ledgers can
also be managed, albeit with an economic security bound. Tokens representing
Real-World Assets can be bridged in the same way, or by extending the trust
users already place in their issuer.
1 Founder of https://reality.eth.link/
2 Crypto Researcher / https://www.linkedin.com/in/alexander-herrmann-a98573a5/
3 Crypto Lawyer and Researcher
1 Introduction 4
2 Background 4
2.1 Subjectivocracy . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
2.2 Forking and composability . . . . . . . . . . . . . . . . . . . . . . 5
2.3 Escalation games and backstops . . . . . . . . . . . . . . . . . . . 6
3 Prior work 6
3.1 SchellingCoin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
3.2 Augur . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
3.3 Kleros . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
3.4 UMA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
3.5 Amoveo . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
3.6 Chainlink . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
5 Bridging Assets 17
5.1 Forkable assets . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
5.2 Unforkable assets . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
5.2.1 Unforkable assets redeemed by third-parties . . . . . . . . 17
5.2.2 Unforkable assets managed by automated fork-choice con-
tracts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
7 Reversibility 19
8 Stablecoins 20
8.1 The proposed mechanism: . . . . . . . . . . . . . . . . . . . . . . 20
2
9 Conclusion 21
3
1. Introduction
2. Background
2.1. Subjectivocracy
Vitalik Buterin coined the term "subjectivocracy" to describe how a ledger can
be split into multiple forks, with users using the one they prefer. Subjectivocracy
4
represents the ultimate opt-in, exit-based governance system: Users are always
free to use the fork that they consider represents the system working as it should.
Additionally, since we may expect that the chain that faithfully embodies the
users’ expectations about the system’s rules will be more useful and assets on it
more valuable, the users’ preferences will be reflected in price signals, providing
objective information that can be observed about the subjective choice of users.
Subjectivocracy differs from other mechanisms commonly used to secure
blockchain protocols such as token voting and Schelling Games which are funda-
mentally economic in nature: they can be defeated by spending some amount
of money to buy tokens or bribe participants. This in turn limits the amount
of value that can be secured before a rational actor will spend this amount of
money attacking the system. Systems relying on economic security are thus
subject to an economic security bound.
In contrast, subjectivocracy simply consists of users making independent
judgments. A well-resourced attacker may be able to deploy their wealth and
influence to encourage people to adopt their preferred fork in the hope of building
a network effect around it, and also to manipulate objective measures like price
signals. However, no amount of money can force a determined user to use a fork
they consider corrupt over one they consider to be functioning correctly.
Subjectivocracy has often been used in the governance of blockchain base
layers. In Ethereum, protocol upgrades are effectively subjectivocratic: Devel-
opers propose a change to the protocol rules, and users are free to use it or
reject it as they see fit. Such upgrades are usually uncontroversial, but may on
occasion result in enduring economic forks like the split between Ethereum and
Ethereum Classic. A subjectivocratic solution is also available in the event that
participants attempt to capture the system in ways that the users do not intend:
If a majority of stakers were to coordinate to prevent certain transactions from
getting into blocks, it is proposed that a new fork of the protocol would be created
implementing “social slashing”, with the effect of punishing the misbehaving
stakers and removing their power to corrupt the system.
5
Forking individual applications without forking the entire base layer is com-
plicated because of its effect on composability: To usefully fork an Ethereum
contract, it is not enough to make a new copy of the contract in question and
let users use the new version. You also need other contracts to know that they
should talk to the new version, which would imply forking other contracts as
well.
3. Prior work
3.1. SchellingCoin
Vitalik Buterin discusses a design for a minimal-trust universal datafeed using
a schelling game. Participants make reports in two stages, the first committing to
a value and the second revealing it. They are rewarded or punished to the extent
that their answers are in line with the answers provided by other participants.
It is assumed that the most likely choice by other participants is the truth, so
each individual participant will be motivated to report truthfully. This depends
on the assumption that a majority of participants are not coordinating.
4 A pure escalation game, with the method of ultimate resolution left open, is implemented
by reality.eth.
6
3.2. Augur
Building on the Truthcoin design by Paul Sztorc, Augur created a prediction
market on the Ethereum blockchain using a combined schelling game and
escalation game backstopped by the ability to fork into two versions. The ability
to fork protects holders of their native token, REP. This protection in turn
protects the system against certain game-theoretical attacks on the schelling
game mechanism such as the p-epsilon attack originally described by Andrew
Miller and discussed by Vitalik Buterin.
However, since the tokens Augur users use to bet are tokens like ETH and
DAI that it cannot cause to fork, it must make use of an economic security
mechanism to decide which of the two forks is “correct”. The mechanism the
design chooses is to require holders of its governance token to move the tokens
into one branch or the other, and measure which fork attracts the most tokens.
The extent of its "subjectivocratic" protection is thus limited to holders of their
native token: A REP holder is always free to choose the “honest” branch, and
continue using the version of the system that reports honestly, even if they are
in the minority, but ETH and DAI holders are at the mercy of the majority.
This in turn means that their system cannot safely handle more value than a
fraction of the total market cap of their governance token, and only economic,
not subjectivocratic security, holds.
To ensure that the system does not exceed its economic security bound, the
system keeps track of the value of outstanding bets, or open interest. If the
value of the open interest becomes dangerously high in relation to its token, it
automatically raises fees in the hope of increasing the token value, reducing the
open interest, or both.
Augur is intended to be used as a self-contained system, with its oracle
serving only Augur markets. The authors note other contracts using the system
as a general-purpose oracle would undermine even its economic security as it
would increase the amount secured without increasing revenue to token-holders;
These are considered “parasite contracts”, and the possibility that they will be
deployed is left as an unsolved problem.
3.3. Kleros
Kleros uses a similar mechanism, but where the escalation game is represented
as a hierarchy of courts, and appeal courts with the Kleros “General Court” at
its apex. To become a juror in any of Kleros’ courts, one needs to stake Kleros’
native token PNK in that chosen court. When an arbitration is requested, the
wallet addresses are randomly chosen as jurors, the more PNK tokens staked
the higher the probability to be chosen. The jurors then participate in schelling
games casting their votes. Unlike Augur, Kleros does not have the ability to fork
built into its smart contracts. However, the ability to fork the system in case of
an attack exists implicitly, and its developers have expressed the intention that
future versions will facilitate forking the system if necessary as a defence against
attacks on its governance process.
But as with Augur, forking would only be enough to save the honest to-
kenholders, not the smart contracts relying on their data, which would still
7
be pointing at the old version of the system in the event of a fork. As such,
the forking mechanism is useful in deterring game-theoretical attacks within its
economic security bound, but not in escaping the economic security bound.
3.4. UMA
UMA follows Augur in attempting to manage the value it controls and ensure
it remains below its economic security bound, which they term the “Cost of
Corruption”. Unlike Augur, it is designed with the goal of serving external
contracts. Instead of managing its open interest internally, it requests that
contracts using it report their own open interest. It then adjusts its fees to
attempt to keep open interest and token value in balance.
The fees involved in maintaining sufficient economic security may not be
trivial; The authors of the UMA whitepaper surmise that in a steady state,
sustaining $100 of open interest may incur $5 fees per year, as investors typically
expect a 5% return on invested capital. They anticipate their system to be used
for financial instruments where the notional value of a position is often much
greater than the amount of actual open interest, in which case these numbers
may seem less daunting; However, there are many use-cases for oracles and
adjudication systems where this will not be the case. For example, if we imagine
using such a system as a backstop to DAO governance, such fees would devour
nearly 20% of the DAO’s assets in just 4 years. As the authors note, the viability
of such systems is at its highest early on, when the valuation of the token mainly
comprises future revenue (after expected growth). This is highly advantageous
when attempting to bootstrap the system, as users can be onboarded with
minimal fees. However, this dynamic acts in the opposite direction as the system
matures, particularly if we expect that at some point it will transition beyond
the steady state considered by the paper and into a winding-down phase.
The UMA whitepaper also discusses approaches to handle what Augur called
Parasite Contracts, and UMA terms “tax evaders”. As the authors note, in
a composable system like Ethereum, it is not possible to prevent users from
reading data from a contract which claims to secure a small amount of open
interest and using it to serve a contract which handles a large amount of open
interest. An alternative the UMA whitepaper discusses is to “fuzz” its outputs,
so that instead of simply reporting results, its reporters are instead tasked with
making the ultimate payouts to users, and these payouts are obscured using
interactive zk-proofs to prevent their use by parasites.
3.5. Amoveo
Amoveo, a blockchain for financial derivatives, implements a proof-or-work
blockchain with an escalation game and an enshrined oracle: Facts about the
world can be settled with an on-chain betting game, and it is proposed that
in the event of a malicious resolution, the blockchain would be forked. To the
extent that it represents assets managed on the blockchain, and users can be
expected to follow even a chain with a minority of proof-of-work, Amoveo can
be considered to have escaped the economic security bound.
8
In practice, implemented as a standalone blockchain, Amoveo has suffered
from a lack of compatibility with other parts of the smart contract ecosystem.
3.6. Chainlink
Chainlink Whitepaper version 2 specifies a staking-based "first-tier incentive
model" to incentivize the publishing of accurate data feeds, but the security of
this model relies on a further "second-tier adjudication model" that can give
reliable judgments to backstop their first-tier system. Several suggestions are
made for possible “second-tier” systems, but they tend to rely on reputation
rather than cryptoeconomics; For some situations, participants with strong
reputations could participate in a multisig arrangement. For others, trusted
hardware could be used, leveraging trust placed on the hardware manufacturer.
We propose that a similar design could leverage our adjudication layer as the
“second-tier” system, removing the need for reliance on reputation.
9
Figure 1: Forking Process: Forks of applications are enabled by forking the whole L2 on
which they are deployed. Long-term the users will then use their preferred fork: The one that -
in their opinion - has the truthful oracle input or correction conflict resolution process/outcome
10
requesting Adjudication Framework, the other one without the disputed
Adjudicator.
5. The governance tokens spent to trigger the fork are used to subsidize an
auction or similar price-discovery mechanism on Layer 1 trading governance
tokens on one of the new forks against each other.
6. Contracts involving sending messages to and from the Layer 1 ledger are
modified to handle the possible existence of multiple forks, and where
necessary choose between them. The decision process on which fork to
choose may resort to the result of the price-discovery process mentioned in
the previous step
11
the challenge is unsuccessful. During the challenge, the Adjudication process
continues as usual unless the bonds have reached a sufficiently high threshold as
specified by the Adjudication Framework.
We envisage a challenge to be decided by an escalation game, conducted
on Layer 1. Where the procedure does not resolve the dispute, its ultimate
adjudication consists of a fork of the ledger, resulting in one version of the ledger
for which the disputed Adjudicator is still part of the Adjudication Framework
in question, and another in which it has been removed.
12
4.3.2. Escalation to an Adjudicator
In the case of a dispute - in reality.eth this usually involves two parties
putting up increasingly high bonds until one pays a fee for arbitration - the issue
is sent to an Adjudication Framework.
The Adjudication Framework delegates it in turn to one of its Adjudicators.
The method by which an Adjudicator is chosen is defined by the Adjudication
Framework. For instance, it may allow anyone to assign the dispute to an
Adjudicator on a first-come, first-served basis, or prioritize Adjudicators according
to an order specified by the user.
13
System charges x% 5 Part of this fee will be burned, and part of it will be used
to provide a subsidy for the price-finding auction (see below).
This escalation payment gives notice that the system will fork in a defined
period, for example 1 week. The fee is sent to the Price-Finding Auction, which
remains open until the last block before the fork, establishing the Fork-Weight
Price.
Once the price-finding period ends, the anchor contract representing the
L2 system will be duplicated into two separate contracts, each representing a
new chain with a new Chain ID. Each new L2 system’s initial state root will
be identical to the old one. The bridge contracts on L1 will also fork into two
bridges for each system. Users must update the Chain IDs in their wallets to
continue interacting with their preferred chain.
The root contract of each ledger on L1 will notify the Adjudication Framework
of the result of its dispute on that particular ledger: On one fork the Adjudicator
will be removed, and on the other, it will be considered to be preserved.
During the entire outlined process, the bridges will remain active and should
operate normally.
The last-resort forking mechanism ensures that the system is not easily
attacked by a malicious party. If the system was used only by rational self-
interested participants, we would expect that it would never escalate to a
forking point: The mere existence of the forking mechanism should be enough to
incentivize users not to escalate propositions that would put them on the losing
side of a fork; it acts like a backstop. In practice, forks are not expected to occur
frequently.
5 The authors expect the adjudication fee to be between 0.2% and 5% of the total token
supply.
6 e.g. Were Ethereum to establish an Ethereum Supreme Court, or similar dispute resolution
14
The structure of any Adjudication Framework is to ensure that cases can
be dealt with fairness, efficiency, and finality, while the forking process ensures
error correction.
We envisage that the protocol will accept Adjudication Frameworks addressing
different categories of disputes, e.g. one focusing on oracles for on-chain price data,
and another addressing insurance sector disputes. Accordingly, depending on the
nature of claims adjudicated under that particular framework, the frameworks
may enforce differing criteria (e.g. decision formats, escalation time periods).
Depending on the subject matter, Adjudicators may use a range of mecha-
nisms including crypto-economic games, AI systems, and traditional panels of
domain experts and dispute resolution practitioners more akin to arbitration
tribunals or courts in a traditional legal system.
15
process must be in compliance with its own terms and the terms of the
Adjudication Framework. Both sets of terms must be plainly made known
and agreed to by its users.8 The form of consent depends on several
factors, including the character of adjudication, but may, for example,
be achieved through an arbitration clause/agreement to arbitrate before
the Adjudicator in the terms/contract or by a submission agreement to
arbitration.
It is hoped that this paper will spark a lively debate on applicable standards
to Adjudication Frameworks and its Adjudicators. The Protocol’s stakeholders
are expected to decide on the exact criteria for Adjudication Frameworks and
their allow-listing. Moreover, the exact mechanism of distinct Adjudication
Frameworks is expected to evolve over time.
fairness but generally not considered sufficient to ensure fairness. We consider fairness, which
usually implies a highly desirable and generally necessary feature of any adjudication method,
but do not generally prescribe it here. We do expect that many Adjudication Frameworks will
prescribe fairness, including neutrality and impartiality in terms of jurors/decision makers,
procedure and rules. Other standards may include: confidentiality, expertise, ethical conduct,
commitment, efficiency, as well as code Feasibility, recognition, and legacy system enforceability.
16
deposits. So for example if the fee was 1 million Forkonomic Tokens and 2 million
Forkonomic Tokens were deposited in the auction, each token paid out will be
matched by an additional 0.5 tokens.
5. Bridging Assets
Since the system is an L2, messages can be sent trustlessly between the Layer
1 ledger and the Layer 2 ledger. Like any other Layer 2 ledger, this can be used
for bridging assets. However, the forking process has consequences for the way
assets can be bridged.
17
5.2.2. Unforkable assets managed by automated fork-choice contracts
For some assets, the process of choosing between the forks can be automated:
Bridges to the L2 can be built so that the unforkable assets are transferred to
the control of one fork after a bifurcation has been initiated.
One possible implementation is to measure the forks’ token prices on L1 and
then delegate the hard assets to the fork with the higher prices. This automation
mechanism relies on economic, not purely subjectivocratic security: A malicious
actor prepared to bid on the "dishonest" branch beyond the value of the tokens
on that branch could make them appear more valuable. This would cause L1
assets whose destination depended on the adjudication proposition at the root
of the contention to be settled according to the "bad" decision, not the “good”
one. The cost of such an attack increases if tokens with high token values are
issued on the forkable ledger, and their combined value is used to measure the
adoption of each branch.
Note that the attack described here would not allow the attacker to steal assets
that were unaffected by the decision in question; For example, ETH bridged
to the L2 and kept in the user’s own wallet would belong to the same user on
both branches, and their owner could withdraw them regardless of which fork the
automated bridge chose as the "winner".
18
6.3. Fast forking
In some cases, contracts need to act immediately and cannot wait for slow
resolution processes. For example, a stablecoin may need price information to
control liquidations, and must liquidate individual under-collateralized positions
quickly in case the situation deteriorates further and the entire system becomes
under-collateralized. In such conditions a variant of the system can be deployed
as a further layer, creating an additional forkable subset of the ledger. This
layer can be forked immediately on payment of a bond, without waiting for
adjudication. Assets locked in bridges between the main forkable layer and
the new layer can be frozen until adjudication is complete and the bridges
receive a message telling them which fork they should follow. Fast forking allows
the operation of the “correct” ledger to continue uninterrupted, at the cost of
requiring users to be alert to the possibility of a fork.
7. Reversibility
Social consensus has sometimes been used to make arbitrary post-hoc changes
to the state of a blockchain. For example, in 2016 Ethereum was forked to restore
assets stolen as the result of a contract bug by creating a new version which
included an irregular state change. Such changes are not a feature of this system.
Forking and social consensus only affect a contract to the extent that it includes
code which requests that the system’s enshrined adjudication process be used to
make a judgment. If a contract does not request data supplied by an Adjudication
Framework, which in turn may request a fork of the system, a fork will not affect
it, except to the extent that the assets it represents may now have a twin on a
fork which was created for some unrelated reason.
There have previously been proposals to incorporate reversibility in either
base protocols or token standards. EIP867 proposed a generic template for
non-standard state transitions to be used to restore assets lost by bugs and
hacks. by Wang, Wang and Boneh proposed a type of new token with the
ability to freeze tokens pending governance decisions, and potentially restore
ownership of the tokens to a previous owner. The design of such systems raises
complicated questions about under what circumstances reversion should be made,
and the optimal solution is likely to depend on the use-case. This in turn creates
complications in how the reversible part of the system should interact with
non-reversible parts, or parts that revert based on different governance methods
and timescales.
The fast-forking mechanism described in the previous section, in combination
with the system’s enshrined adjudication backstop, provides the necessary pre-
conditions to create a ledger which enables reversibility. A ledger on top of the
system’s layer 2 has a state root which can be revised. A governance proposal
can specify a change which can be applied to create a new state root. This
may take the form of a containment fork reverting to the state directly before
the fork and temporarily freezing the affected contracts, or a resolution fork
restoring asset ownership or setting other contract data to the state proposed by
19
governance. A delay in moving assets out of bridges, which can be extended when
in a forking state, allows the fast-forking ledger to conduct reversals without
affecting the underlying ledger. The underlying ledger’s enshrined adjudication
can provide a backstop for the mechanism judging which of the forks should be
used for bridged assets. The underlying ledger is only itself forked in the case
of an escalated dispute. The system is well-suited to meeting the challenges of
handling interactions between reversible subsystems.
Further discussion about these constructions can be found at https://ethresear.ch/t/recovering-
from-smart-contract-hacks-forkable-reversible-roll-ups/16781
8. Stablecoins
20
money: If a branch is initially attributed some value - let’s say 5% - after a
forking process, and if later that branch is abandoned, causing the Forkonomic
Token of that branch to be worth 0, then the CDPs can no longer remain active
and the FAI will be liquidated. This would result in a 5% loss of value for the
user.
The reason is that the original value of FAI was rebased by 5% during the
forking process, but this 5% of the value will be lost once the claim is available
to the user, as all CDPs would be liquidated.
Given that in most cases, the value of the FAI token is preserved during
forking 9 and forking is expected to happen rarely, FAI will provide most benefits
of a non-forkable stablecoin. The shortcomings are mostly about the rebasing of
value and its implications.
9. Conclusion
The system proposed in this paper has the potential to overcome the limi-
tations inherent in dispute resolution and oracle protocols that rely solely on
economic security. It provides a platform on which applications can be deployed
with little or no alteration, and easily benefit from subjectivocratic security in a
way that has previously only applied to base layers.
The system retains compatibility with the Layer 1 on which it is deployed,
and can trustlessly obtain information about the state of the Layer 1 ledger or
other Layer 2s deployed on the Layer 1 ledger. Unforkable assets from the Layer
1 ledger can be bridged trustlessly to the Layer 2 ledger, albeit with an economic
security bound concerning decisions over which the Layer 2 ledger may fork.
The greater probability that the system will fork compared to the Layer 1
ledger on which it is deployed poses challenges for stablecoin designs, but these
problems can be mitigated with the fork-aware designs outlined in this paper.
Free from an economic security bound, the system provides a robust backstop
which can strengthen the existing designs of oracles and governance systems and
enables new experiments. This in turn allows the creation of more secure Defi
systems, stronger protocols for insurance and prediction markets, and better
governance for decentralized organizations.
9 If the fork splits more equally - say 40%/60% - then the potential loss is the highest, but
also the likelihood for one chain to lose all its value entirely is the smallest.
21