<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.3 20070202//EN" "journalpublishing.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="review-article">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">Front. Blockchain</journal-id>
<journal-title>Frontiers in Blockchain</journal-title>
<abbrev-journal-title abbrev-type="pubmed">Front. Blockchain</abbrev-journal-title>
<issn pub-type="epub">2624-7852</issn>
<publisher>
<publisher-name>Frontiers Media S.A.</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="doi">10.3389/fbloc.2019.00005</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Blockchain</subject>
<subj-group>
<subject>Review</subject>
</subj-group>
</subj-group>
</article-categories>
<title-group>
<article-title>Blockchain and Public Record Keeping: Of Temples, Prisons, and the (Re)Configuration of Power</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author" corresp="yes">
<name><surname>Lemieux</surname> <given-names>Victoria L.</given-names></name>
<xref ref-type="corresp" rid="c001"><sup>&#x0002A;</sup></xref>
<uri xlink:href="http://loop.frontiersin.org/people/578689/overview"/>
</contrib>
</contrib-group>
<aff><institution>School of Library, Archival and Information Studies, University of British Columbia</institution>, <addr-line>Vancouver, BC</addr-line>, <country>Canada</country></aff>
<author-notes>
<fn fn-type="edited-by"><p>Edited by: Massimo Bartoletti, University of Cagliari, Italy</p></fn>
<fn fn-type="edited-by"><p>Reviewed by: Marcella Atzori, University College London, United Kingdom; Jason Potts, RMIT University, Australia</p></fn>
<corresp id="c001">&#x0002A;Correspondence: Victoria L. Lemieux <email>v.lemieux&#x00040;ubc.ca</email></corresp>
<fn fn-type="other" id="fn001"><p>This article was submitted to Non-Financial Blockchain, a section of the journal Frontiers in Blockchain</p></fn></author-notes>
<pub-date pub-type="epub">
<day>12</day>
<month>07</month>
<year>2019</year>
</pub-date>
<pub-date pub-type="collection">
<year>2019</year>
</pub-date>
<volume>2</volume>
<elocation-id>5</elocation-id>
<history>
<date date-type="received">
<day>12</day>
<month>02</month>
<year>2019</year>
</date>
<date date-type="accepted">
<day>14</day>
<month>06</month>
<year>2019</year>
</date>
</history>
<permissions>
<copyright-statement>Copyright &#x000A9; 2019 Lemieux.</copyright-statement>
<copyright-year>2019</copyright-year>
<copyright-holder>Lemieux</copyright-holder>
<license xlink:href="http://creativecommons.org/licenses/by/4.0/"><p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.</p></license>
</permissions>
<abstract><p>This paper discusses blockchain technology as a public record keeping system, linking record keeping to power of authority, veneration (temples), and control (prisons) that configure and reconfigure social, economic, and political relations. It discusses blockchain technology as being constructed as a mechanism to counter institutions and social actors that currently hold power, but whom are nowadays often viewed with mistrust. It explores claims for blockchain as a record keeping force of resistance to those powers using an archival theoretic analytic lens. The paper evaluates claims that blockchain technology can support the creation and preservation of trustworthy records able to serve as alternative sources of evidence of rights, entitlements and actions with the potential to unseat the institutional power of the nation-state.</p></abstract> <kwd-group>
<kwd>blockchain</kwd>
<kwd>records</kwd>
<kwd>record keeping</kwd>
<kwd>trust</kwd>
<kwd>power</kwd>
</kwd-group>
<contract-sponsor id="cn001">University of British Columbia<named-content content-type="fundref-id">10.13039/501100005247</named-content></contract-sponsor>
<contract-sponsor id="cn002">Mitacs<named-content content-type="fundref-id">10.13039/501100004489</named-content></contract-sponsor>
<counts>
<fig-count count="2"/>
<table-count count="0"/>
<equation-count count="0"/>
<ref-count count="54"/>
<page-count count="14"/>
<word-count count="12903"/>
</counts>
</article-meta>
</front>
<body>
<sec sec-type="intro" id="s1">
<title>1. Introduction</title>
<p>As a distributed ledger, blockchain technology is, at its heart, a record keeping technology. Without going into technical details of its operation, aspects of which will be discussed later in this paper, and which are quite varied across different blockchain platforms in any case, it is in large part due to the intended making and keeping of tamper-resistant and transparent recordings of transactions that is said to make blockchains trustworthy (Nakamoto, <xref ref-type="bibr" rid="B59">2008</xref>; Peters and Panayi, <xref ref-type="bibr" rid="B64">2016</xref>; Atzori, <xref ref-type="bibr" rid="B5">2017</xref>). These characteristics are arguably what allow blockchain records to serve as a basis of trust (Vigna and Casey, <xref ref-type="bibr" rid="B80">2019</xref>), in particular in human social, economic and political relations&#x02014;the focus of this paper.</p>
<p>According to some, as a record keeping technology, blockchains could be truly revolutionary. They could reconfigure power away from nation states and traditional elites and redistribute it. One of the central mechanisms by which power may be reconfigured is by the use of blockchain technology to wrest control of states&#x00027; monopoly over public record keeping (Markey-Towler, <xref ref-type="bibr" rid="B56">2018</xref>). The central questions then become, in a world where governments, the supposed guarantors of trustworthy public record keeping, may no longer be trusted to deliver trustworthy public records, does blockchain technology offer a viable trusted alternative to state-backed record keeping? To whom is power redistributed in a world of blockchain record keeping and what kind of socio-political power dynamics may this configure?</p>
<p>This paper offers an archival theoretic discussion of these questions. Its central argument is that, though some proponents of blockchain technology make strong claims about offering a trusted alternative to the current public record keeping monopoly of nation-states, on close examination there are many aspects of how public blockchain record making and keeping currently operate-or are envisioned to operate-that raise questions about blockchains as trustworthy forms of public record keeping. Moreover, public blockchain record keeping tends to concentrate power in the hands of a few social actors&#x02014;a techno plutocracy&#x02014;without the guarantees and protections afforded by the rule of law and democratic principles of governance. Finally, in some cases blockchain technology&#x00027;s operation is premised upon the self-sovereignty of the individual when, in fact, social relations are interlinked by familial and community bonds, bonds which may be unsupported or require further development in blockchain public record keeping solutions.</p>
<p>To advance these arguments, the paper is organized into several sections. Section 1 discusses the historical relationship that exists between writing and record keeping, on the one hand, and institutionalized power, on the other hand. Section 2 discusses the basis of claims about the legitimacy of state-backed public record keeping with the power to confer rights and entitlements upon social actors within state-backed juridical frameworks and points to the similarity of some claims about public blockchain record keeping. In section 3, the paper addresses recent state-backed measures to &#x0201C;co-opt&#x0201D; blockchain record keeping into state frameworks for public record keeping and existing institutionalized power structures. Section 4 presents an archival theoretic analysis of the trustworthiness of blockchain record keeping, problematizing some of the claims made about the inherent trustworthiness of blockchain records and record keeping. Finally, section 5 explores the implications of blockchain-based self-sovereign identity and data self-sovereignty as an alternative form of public record keeping. The paper concludes with a call to address the shortcomings in designs and implementations of blockchain record keeping so as to be better able to realize the worthy vision of blockchains as offering alternative trustworthy public record keeping and a (re)configuration of power that enhances public trust and protects individuals and social groups from exploitation.</p></sec>
<sec id="s2">
<title>2. Building Temples: A Brief History of Power and Public Record Keeping</title>
<p>Public record keeping and writing, which enjoy a symbiotic relationship, have for centuries provided the foundation for society&#x00027;s institutional systems of government, education, and so on (Duranti, <xref ref-type="bibr" rid="B24">1989a</xref>,<xref ref-type="bibr" rid="B25">b</xref>). Public record making relies upon the technology of writing, which is arguably one of the greatest inventions of human history (Robinson, <xref ref-type="bibr" rid="B67">1995</xref>, p. 7). Moreover, the keeping of writings (i.e., record keeping), establishes and provides evidence of rights, entitlements and decisions that breathe life into society&#x00027;s juridical systems and socio-political and economic institutions (Latour, <xref ref-type="bibr" rid="B47">1986</xref>; De Soto, <xref ref-type="bibr" rid="B19">2000</xref>). Writing and record keeping together have configured and re-configured humanity&#x00027;s social institutions from the outset by putting agreements, laws, and commandments on record. According to H. G. Wells, writing, and associated processes of record keeping, made the growth of states larger than the old city states possible. He writes, &#x0201C;The command of priest or king and his seal could go far beyond his sight and voice and could survive his death&#x0201D; (Wells, <xref ref-type="bibr" rid="B83">2005</xref>). Writing and record keeping extend human memory from the individual to the collective and social (Brothman, <xref ref-type="bibr" rid="B11">2001</xref>). Moreover, it is through the &#x0201C;everyday techne&#x0201D; of writing and record keeping that the seemingly mundane task of inscribing and keeping ledgers constitutes and represents power relations and social negotiations (Latour, <xref ref-type="bibr" rid="B47">1986</xref>; Orlikowski, <xref ref-type="bibr" rid="B63">1992</xref>; Walters, <xref ref-type="bibr" rid="B82">2002</xref>). Thus, though records contain data, they are not conceptually equivalent to data. Data embeds and conveys information; whereas, records embed and convey power.</p>
<p>As with all technology, those with the technological capability&#x02014;the kings, the priests, the nation states, and more recently, global tech companies&#x02014;have used writing and record keeping to grasp, exercise, and consolidate power, power which can always be used for good or ill. Who would disagree that the use of writing in state-funded education has not been socially beneficial? On the other hand, writing and record keeping also has been used throughout millennia to control and suppress: &#x0201C;Babylonian and Assyrian cuneiform, Egyptian hieroglyphs and the Mayan glyphs of Central America, carved on palace and temple walls, were used much as Stalin used posters about Lenin in the Soviet Union: to remind the people who was the boss, how great were his triumphs, how firmly based in the most high was his authority&#x0201D; (Robinson, <xref ref-type="bibr" rid="B67">1995</xref>, p. 9). In recent times, the assembly of great repositories of records containing data&#x02014;so called big data&#x02014;has given rise to powerful platforms, such as Facebook and Google (Kenney and Zysman, <xref ref-type="bibr" rid="B45">2016</xref>). These uses of writing and record keeping remind us that control over the recording of memory is at the heart of political and economic power (Derrida, <xref ref-type="bibr" rid="B21">1996</xref>; De Soto, <xref ref-type="bibr" rid="B19">2000</xref>). Where there is writing and records, there also have been &#x0201C;temples&#x0201D; of historical writings or houses of record keeping&#x02014;archives and public registries&#x02014;whether kept by priests in temples or nation states in public institutions of &#x0201C;cultural memory&#x0201D; (Posner, <xref ref-type="bibr" rid="B66">1972</xref>; Duranti, <xref ref-type="bibr" rid="B24">1989a</xref>,<xref ref-type="bibr" rid="B25">b</xref>). These houses of record keeping have preserved writings as a means of producing and reproducing social institutions and their embedded power relations beyond space and time (Jimerson, <xref ref-type="bibr" rid="B43">2009</xref>). Such physical repositories funded as they were by powerful social institutions often held a special legitimacy as bastions of &#x0201C;The Truth,&#x0201D; or at least, facts comprising assemblages of truth that could be extracted (Cunningham, <xref ref-type="bibr" rid="B17">2017</xref>). Archival theorist Rand Jimerson invokes three metaphors for these houses of memory, or archives: temples, prisons, and restaurants. He writes,</p>
<disp-quote><p>The temple reflects the power of authority and veneration. The prison wields the power of control. The restaurant holds the power of interpretation and mediation. These represent the trinity of archival functions: selection, preservation, and access. Archives at once protect and preserve records [the temple]; legitimize and sanctify certain documents while negating and destroying others [the prison]; and provide access to selected sources while controlling the researchers and conditions under which they may examine the archival record [the restaurant] (Jimerson, <xref ref-type="bibr" rid="B43">2009</xref>, p. 2).</p></disp-quote>
<p>Invading marauders and those who have sought to topple existing power structures have long understood the power of houses of record keeping as seats of socio-political and economic power, and fought to seize or destroy them&#x02014;from the destruction of the Library of Alexandria, to the capture of the archives during the US invasion of Grenada, to more recent destruction of records in Iraq and Afghanistan (see e.g., Posner, <xref ref-type="bibr" rid="B66">1972</xref>; Seabury and McDougall, <xref ref-type="bibr" rid="B68">1984</xref>; Zgonjanin, <xref ref-type="bibr" rid="B85">2005</xref>; Deutch and Habal, <xref ref-type="bibr" rid="B22">2018</xref>). Thus, to take aim at the function of the archives and record keeping, which many blockchain solution developers overtly do, is to take aim at the very seat of a political regime&#x00027;s (or its opponents&#x00027;) base of power.</p>
<p>Bitcoin exemplifies the use of record keeping&#x02014;the ledger&#x02014;as both a form of protest and path of resistance to existing power structures. The first block of the Bitcoin blockchain contains a reference to an article that appeared in the January 3rd, 2009 edition of The Times concerning the bailout of banks during the global financial crisis and the third block contains a tribute to a cryptography researcher associated with the Cypherpunk movement (Anduck, <xref ref-type="bibr" rid="B3">2018</xref>). These entries in the Bitcoin public ledger allude to a belief in the use of cryptography and cryptocurrency as countering the misuse of power by society&#x00027;s elite&#x02014;the 1%. This belief can be traced to intellectual roots in Ted Hughes&#x00027; A CypherPunk Manifesto, which influenced a number of the early blockchain developers (Bandyopadhyay, <xref ref-type="bibr" rid="B7">2018</xref>). In his manifesto, Hughes asserts,</p>
<disp-quote><p>We must defend our own privacy if we expect to have any. We must come together and create systems which allow anonymous transactions to take place&#x02026;The technologies of the past did not allow for strong privacy, but electronic technologies do. We the Cypherpunks are dedicated to building anonymous systems. We are defending our privacy with cryptography, with anonymous mail forwarding systems, with digital signatures, and with electronic money (Hughes, <xref ref-type="bibr" rid="B40">1993</xref>).</p></disp-quote>
<p>In a similar vein, in 2014 the president of Factom, a company developing blockchain technology, was quoted as saying,</p>
<disp-quote><p>Factom creates permanent records that can&#x00027;t be changed later. In a Factom world, there&#x00027;s no more robo-signing scandals (referring to US mortgage foreclosures during the financial crisis). In a Factom world, there are no more missing voting records. In a Factom world, you know where every dollar of government money was spent. Basically, the whole world is made up of record keeping, and as a consumer, you&#x00027;re at the mercy of the fragmented systems that run these records&#x02026;The dream of many is to extend the honesty inherent to an immutable ledger validated by math to chaotic, real-world interactions. By allowing the construction of unbounded ledgers backed by the blockchain (Higgins, <xref ref-type="bibr" rid="B38">2014</xref>).</p></disp-quote>
<p>Projects, such as BitNation<xref ref-type="fn" rid="fn0001"><sup>1</sup></xref>, which bills itself as providing governance as a service and jurisdictional sovereignty, seek to circumvent existing nation states to provide &#x0201C;do-it-yourself government services&#x0201D; (Atzori, <xref ref-type="bibr" rid="B4">2015</xref>, p. 5), such as registration of marriage licenses, land transfers, and identities.</p>
<p>The above examples can be understood in the context of efforts throughout history led by those with less socio-political or economic power and authority to use writing and record keeping to resist social control or re-configure existing societal power relations (Foucault, <xref ref-type="bibr" rid="B33">1980</xref>; Tyacke, <xref ref-type="bibr" rid="B78">2001</xref>; Blouin and Rosenberg, <xref ref-type="bibr" rid="B10">2012</xref>). Other examples of the use of writing and recording in resistance to power through records and record keeping can be seen in the application of freedom of information laws around the world to gain access to public records (Neuman and Calland, <xref ref-type="bibr" rid="B62">2007</xref>; Lemieux and Trapnell, <xref ref-type="bibr" rid="B53">2016</xref>), or controversially, leaking of documents to uncover state, corporate and elite abuse of power (e.g., Wikileaks, Anonymous) (Sifry, <xref ref-type="bibr" rid="B69">2011</xref>). In Power/Knowledge, Foucault writes that there is no relationship of power without the means of escape or possible flight (Foucault, <xref ref-type="bibr" rid="B33">1980</xref>). It is not just a question of one person or group having power or knowledge. Power and knowledge exist in dynamic relationship to one another. The person or group with less power can resist, can take power back, or change the power dynamic, because power and knowledge are intertwined.</p>
<p>Observers of blockchain technology have noted the revolutionary implications of blockchain record keeping&#x00027;s potential to reconfigure socio-political and economic power relations. In 2015, Swan saw blockchains as being as &#x0201C;fundamental for forward progress in society as Magna Carta or the Rosetta Stone&#x0201D; (Swan, <xref ref-type="bibr" rid="B73">2015</xref>, p. viii). In a 2018 article in Newsweek, Paul Casey, co-author of the book the Truth Machine, is quoted as saying, &#x0201C;The entire global system of record keeping is going to go through a 5,000-years paradigm shift&#x02026;We&#x00027;ve tracked and checked records, and records are the foundational layer of economic exchange systems, they go right back to Sumerian tablets. We had centralized versions of that for 5,000 years. Now, we&#x00027;re doing a decentralized thing that is a game changer&#x0201D; (Piore, <xref ref-type="bibr" rid="B65">2018</xref>). Brendan Markey-Towler, an Australian institutional economist, has observed that Blockchain technology unsettles existing centers of power because it allows everyone to keep records and update them by collective assent (Markey-Towler, <xref ref-type="bibr" rid="B56">2018</xref>). This raises the question: could blockchain public record keeping unseat legitimate state-backed public record keeping, and by extension, states themselves? To answer this question, it is necessary to understand the basis of the legitimacy of public records and record keeping.</p></sec>
<sec id="s3">
<title>3. The Temple as Bestower of Legitimacy: The Basis of Trusted Public Record Keeping</title>
<p>Archival theorist Luciana Duranti has written of the basis of archives as trusted repositories of public records in Roman law. In the Justinian code, an archives (synonymous with an archival institution) is defined as <italic>locus publicus in quo instrumenta deponuntur</italic> (i.e., the public place where deeds are deposited), <italic>quatenus incorrupta maneant</italic> (i.e., so that they remain uncorrupted), <italic>fidem faciant</italic> (i.e., provide trustworthy evidence), and <italic>perpetua rei memoria</italic> sit (i.e., be continuing memory of that to which they attest) (Duranti, <xref ref-type="bibr" rid="B26">1996</xref>, <xref ref-type="bibr" rid="B28">2007</xref>, p. 447).</p>
<p>It is not only the deposit of public records in archival repositories&#x02014;temples of records, if you will&#x02014;that renders them trustworthy and capable of serving as evidence of socio-political and economic rights and entitlements, but the fact that these repositories embody juridical power. The German jurist Ahasverus Fritsch first commented on this in 1664, observing that archival documents did not acquire their authenticity by the mere fact of being set aside in an archival repository but rather by the fact that the repository in which they were placed belonged to a public sovereign authority, that the officer depositing them was a public officer, that the documents were, by their placement in the archives, associated both physically (i.e., by location) and intellectually (i.e., by description) with related authentic documents, and that this association was meant to endure (Duranti, <xref ref-type="bibr" rid="B28">2007</xref>, p. 448). For example, in ancient Rome, the <italic>tabellio</italic> was a government official who received, authenticated and kept records in a public archives, the <italic>tabullarium</italic>. Records produced from the <italic>tabullarium</italic> during litigation enjoyed special authority as evidence. Such documentary evidence, known as <italic>instrumenta fides</italic> or <italic>instrumenta publica</italic>, held such status that the party challenging them bore the burden of proving they were untrustworthy (Head, <xref ref-type="bibr" rid="B37">2013</xref>, p. 914). Moreover, such was the power of public archives to legitimize records as trustworthy evidence that even those records not produced by the state, that is, even those of private origin, once they had been deposited in a public archives were deemed to be authentic (Duranti, <xref ref-type="bibr" rid="B24">1989a</xref>). This legitimacy bestowed upon records by means of archival preservation came to be known as the principle of ius archivi, a presumption of authenticity conferred upon records by virtue of their being preserved by special custodians and in special places (e.g., public archives) and accorded special legitimacy under a juridical system (Head, <xref ref-type="bibr" rid="B37">2013</xref>).</p>
<p>Thus, when the power and legitimacy of the state is diminished, so too is the power of the archives to legitimate evidence of rights and entitlements. Such rights and entitlements may, therefore, be challenged and even overturned, which, recursively, further diminishes the power of the state. This is most obvious in cases of war or revolution. For example, after Fidel Castro assumed political leadership in Cuba, many individuals who had held title to land under the existing regime lost that title when the old regime was toppled, which enabled the new regime to consolidate its power base (Fisher, <xref ref-type="bibr" rid="B31">2014</xref>). Moreover, competing powers may establish archives that contain documentary evidence asserting different or competing versions of truth. In essence, this was the case with South Africa&#x00027;s Truth and Reconciliation Commission in which the supremacy of the state-backed national archives was challenged and alternative archives comprising both documentary and oral evidence were established (Hamilton et al., <xref ref-type="bibr" rid="B36">2005</xref>). Similarly, in Canada, processes of Truth and Reconciliation involving the &#x0201C;decolonization&#x0201D; of Canada&#x00027;s First Nations peoples problematize the trustworthiness of government records as evidence of the lived-experience of Indigenous individuals and pave the way for new memory institutions that stand as challenges to the previously dominant representation of &#x0201C;facts&#x0201D; (TRC, <xref ref-type="bibr" rid="B76">2018</xref>). Diminishment of the power and legitimacy of the state, and thus the evidentiary legitimacy of the records it holds, also derives from reduced public trust in the state and its officials seen over recent years (Levi and Stoker, <xref ref-type="bibr" rid="B54">2000</xref>; Tolbert and Mossberger, <xref ref-type="bibr" rid="B75">2006</xref>; Keele, <xref ref-type="bibr" rid="B44">2007</xref>; Edwards, <xref ref-type="bibr" rid="B30">2015</xref>). This growing mistrust leaves the door open for challengers to state-backed authority, challengers who may choose to offer more &#x0201C;trustworthy&#x0201D; alternatives to perceived untrustworthy state public record keeping as a more indirect modality of resisting state power and authority than a direct attack.</p>
<p>Analogies may be drawn between these processes and the rise of blockchains as challengers to existing power structures, including those of the nation state, through their role as new public notaries, public record keepers, and archives. Alston (<xref ref-type="bibr" rid="B2">2019</xref>, p. 14), for example, likens the system of rules that govern blockchains to constitutional systems: &#x0201C;The participants, or network nodes, in a given blockchain play the role of government,&#x0201D; he writes, and &#x0201C;users of a given blockchain can be seen as constituents.&#x0201D; In this emergent juridical system, which instantiates a new socio-political and economic order, code becomes law and a new <italic>lex cryptographia</italic> challenges existing legal frameworks (De Filippi, <xref ref-type="bibr" rid="B18">2018</xref>; Yeung, <xref ref-type="bibr" rid="B84">2019</xref>). As Markey-Towler (<xref ref-type="bibr" rid="B56">2018</xref>) observes, public record keeping has, for centuries, provided the foundation for society&#x00027;s institutional systems (i.e., government, education, and so on). Thus, blockchain, in staking a claim to disintermediate and replace the traditional public archives, registry, and notary (as signaled in the quotes from Factom and BlockTech <italic>supra</italic>) presents the strongest challenge yet to &#x0201C;the monopoly of the state over the promulgation, formation, keeping, and verification of institutions and the public record&#x0201D; (Markey-Towler, <xref ref-type="bibr" rid="B56">2018</xref>, p. 13).</p>
<p>Atzori (<xref ref-type="bibr" rid="B5">2017</xref>), however, questions the ability of blockchains to usurp nation-state legitimacy. She points out that open, permissionless blockchains have several limits for public administration and e-government. The first limit is that they can turn out to be weak and fragmented, while the second is that they do not necessarily provide for democratic government. Atzori makes the point that democracy is more complex than a set of rules established by core developers around consensus. It is, she asserts, as much about adequate quality and ability to participate, the legitimacy of procedures, protection of minority rights, freedom of participants, and equal opportunity to access decision making (Atzori, <xref ref-type="bibr" rid="B5">2017</xref>, p. 8), Alston (<xref ref-type="bibr" rid="B2">2019</xref>, p. 16) makes similar arguments, pointing out that blockchain governance differs from democratic constitutional government in the lack of separation between legislative and judicial powers; that is, core developers both write the laws and decide upon their interpretation. Moreover, unlike in constitutional governments where constituents may dispute a law without having to revoke their citizenship, constituents (i.e., users of public blockchains) face high exit costs if they disagree with the governance rules: either they accept the new rules and continue to participate in the blockchain system, or they reject them and have to exit the blockchain system entirely (i.e., in cases of a &#x0201C;hard fork&#x0201D; in the blockchain). Current blockchain governance arrangements create a techno plutocracy that foments imbalances of power between developers and users and a tendency toward economic individualism over a common good (Gervais et al., <xref ref-type="bibr" rid="B35">2013</xref>; Atzori, <xref ref-type="bibr" rid="B5">2017</xref>). Since the legitimacy of blockchains as keepers of public records depends on the legitimacy of blockchain juridical systems, it would seem that public, permissionless blockchains still have a far way to go to be fully worthy of public trust to a degree that would topple the nation state as the dominant juridical system and public record keeper. Lawrence Lessig&#x00027;s warning is worth heeding: &#x0201C;To push the antigovernment button is not to teleport us to Eden. When the interests of government are gone, other interests take their place. Do we know what those interests are? And are we so certain they are anything better?&#x0201D; (cited in Atzori, <xref ref-type="bibr" rid="B4">2015</xref>).</p></sec>
<sec id="s4">
<title>4. Coopting Blockchain Record keeping: The Defense of State-Backed Public Record Keeping Against Disruption</title>
<p>Some jurisdictions have enacted legislative provisions which confer upon the records produced by means of blockchain technology a <italic>publica fides</italic>&#x02014;a confidence conferred by legitimate public authority in the authenticity of the record. These jurisdictions&#x00027; motivation for passing such laws appear to be rooted in economics, however, rather than in an overriding concern for the creation and preservation of reliable and authentic records or fear of being overtaken as public record keepers by public blockchains as a form of challenge to state authority (State of Vermont, <xref ref-type="bibr" rid="B71">2016</xref>). Thus, their actions are better explained as co-option of blockchain for public record keeping rather than as a consciously direct defense against a perceived threat to the legitimacy of the state as public record keeper. Nevertheless, the result is that by co-opting the power of blockchains and conferring state-backed legitimacy on blockchain public record keeping, these states avoid immediate disruption of their role as legitimate keepers of the public record.</p>
<p>As examples, a law passed in 2016 in the State of Vermont (<xref ref-type="bibr" rid="B71">2016</xref>), an act relating to miscellaneous economic development provisions, provides that a digital record electronically registered in a blockchain is to be considered authentic, provided that it is accompanied by a written declaration of a qualified person, made under oath, stating the qualification of the person to make the certification, and if it is accompanied by the date and time at which the record entered the blockchain, the date and time at which the record was received from the blockchain, and evidence that the record was maintained in the blockchain in the usual and ordinary course of business.</p>
<p>There are several problematic aspects of the provisions of the Vermont legislation. The first is the question (and even irony) of who would be considered to be a &#x0201C;qualified person&#x0201D; pursuant to the act. Would it be the designers of the blockchain system? They could hardly be said to be disinterested but could be cross-examined under oath about the mode of record keeping in their ledger as many information professionals have been called to do (see e.g., California Public Utilities Commission and Consumer Protection and Safety Division, <xref ref-type="bibr" rid="B12">2012</xref>). Or, should it be an independent third party, such as an auditor, or some state-appointed official, with greater disinterest but less direct knowledge of the system? Or, should it be a combination of these approaches? In any case, certification would rely on expertise that, though trusted, may not, in fact, be trustworthy. The jury is still out on how to build a legal foundation for certification of the authenticity of records generated in blockchain systems, but such standards of evaluation would provide some clarity about how to interpret legal provisions, such as those passed in Vermont. Another problematic aspect is the requirement for there to be a date and time of recordation. Some blockchain systems use timestamps, some do not, relying instead on the sequential ordering of transactions in the chain as a proxy for time. Even when a timestamp is used, it may rely on system generated time which may vary from calendar time, and moreover, may be subject to error or manipulation (Lemieux, <xref ref-type="bibr" rid="B48">2016</xref>). To address this variance, some blockchains publish transaction hashes out to public media, such as newspapers or Twitter, to link the transaction order to calendar time (see e.g., Anduck, <xref ref-type="bibr" rid="B3">2018</xref>). Similar to the Vermont law, a law passed by the State of Arizona (<xref ref-type="bibr" rid="B70">2017</xref>) gives recognition to smart contracts, conferring upon them the status of an electronic record, and specifying that a contract relating to a transaction may not be denied legal effect, validity or enforceability solely because that contract contains a smart contract term. The provisions of the Arizona law do not make it clear, however, as to what should be considered to be a fully executed smart contract and when a smart contract should be considered to be fully in force. Following the norms and laws applicable to other types of contracts, a smart contract might be considered technically complete as a record (i.e., in effect) when it is digitally signed (and witnessed), validated, confirmed and entered into a blockchain ledger by a predetermined number of nodes; that is, when it can no longer be repudiated. Non-repudiation in this context is synonymous with confirmation of the transaction. There is no definitive answer to the question of how many nodes must update their copies of a distributed ledger before a transaction is considered confirmed; the answer will vary according to the design of the blockchain, for example, the type of consensus mechanism it uses and who operates the nodes that participate in validation and confirmation (Bitcoin Wiki, <xref ref-type="bibr" rid="B9">2016</xref>). Not only does the Arizona law fail to provide guidance on when a smart contract should be considered fully executed and in force, the definition of smart contract it establishes adds confusion. The Act defines a smart contract as &#x0201C;An event-driven program, with state, that runs on a distributed, decentralized, shared and replicated ledger and that can take custody over and instruct transfer of assets on that ledger.&#x0201D; To use the expression &#x0201C;that runs,&#x0201D; as the Arizona law does, instead of &#x0201C;has run&#x0201D; might be likened to giving a draft contract full legal status, since, in a blockchain context, the expression does not imply a contract that has been validated and confirmed on a distributed ledger, and thus could be considered to be beyond repudiation.</p>
<p>The above discussion outlining difficulties with applying existing legal principles to novel blockchain-based records suggests that legislating the same presumption of authenticity for blockchain records as is given to more traditional forms of records kept by public bodies is premature. Indeed, this view is supported in a 2016 report prepared by the State of Vermont&#x00027;s own public archives at the time that the state&#x00027;s blockchain legislation was under discussion. The committee noted that further study is required before considering blockchains for the regular business of the State, and moreover, any application would certainly need to support rather than replace the existing records management infrastructure (Condos et al., <xref ref-type="bibr" rid="B16">2016</xref>, p. 20). Despite the lack of maturity of the technology, some state law makers nevertheless seem intent on capturing the economic advantage that a permissive approach to assessment of the trustworthiness of blockchain records may bring. But, at what cost to the public record?</p></sec>
<sec id="s5">
<title>5. Blockchains as Trusted Public Record Keepers</title>
<p>The inability to trust supposedly trusted record keepers is not a new problem. While archives and public registries are supposed to be trusted repositories which, in liberal democracies, operate in the interests of &#x0201C;the people,&#x0201D; in reality, there are many occasions when they have been shown to operate in the interests of powerful political and social elites that have their own interests in mind (Hamilton et al., <xref ref-type="bibr" rid="B36">2005</xref>). Countless examples throughout history that one could point to exist but two recent examples will serve to illustrate the point. Archivist Verne Harris has written of how the South African National Archives became an instrument of the Apartheid regime, noting that many documents that would have provided evidence of human rights violations perpetrated by South Africa&#x00027;s Apartheid government, and which later came to light in oral testimony given to a South African Truth and Reconciliation Commission, were suppressed by the National Archives (Hamilton et al., <xref ref-type="bibr" rid="B36">2005</xref>, p. 31). In a similar vein, British officials are said to have tampered with and falsified the historical record in many former colonies during the period of decolonization in order to avoid political and economic responsibility for some of the effects of colonization (Cobain, <xref ref-type="bibr" rid="B14">2016</xref>). Nor has meddling with the public record necessarily stopped. On this activity, Ian Cobain writes in <italic>The History Thieves</italic>, of how documents relating to the involvement of the British SAS in the Indian military&#x00027;s 1984 attack on the Golden Temple in Amritsar were reviewed for transfer to the UK National Archives at Kew not as a means of identifying records of historical value but as an opportunity to weed out documents that contained embarrassing material about the government (Cobain, <xref ref-type="bibr" rid="B14">2016</xref>, p. 147).</p>
<p>Indeed, the problem of lack of trustworthiness of legitimate public record keeping authorities is timeworn. This very problem gave rise to the seventeenth century theories and principles developed by Jean Mabillon which even today underpin the education of the archivist. Jean Mabillon was a French Benedictine monk and scholar of the Congregation of Saint Maur who is considered to be the father of the disciplines of paleography and diplomatics. In 1681 he wrote <italic>De re diplomatica</italic>, which laid out the tenants by which documents could be examined to determine their authenticity (Mabillon, <xref ref-type="bibr" rid="B55">2004</xref>). Mabillon&#x00027;s text was a direct response to arguments over authenticity of documents held within the Abbey of St. Denis, one of the perceived legitimate record keepers of the time by virtue of being part of the dominate juridical system of the day&#x02014;the Catholic Church. In describing his work, Mabillon rejected the notion that he should accept the legitimacy of documentary sources preserved in the Abbey simply by virtue of their placement there. Instead, he undertook a careful and scientific study of ancient documents over a period of 20 years with a view to being able to objectively determine which ones were authentic and which were inauthentic.</p>
<p>A similar attitude would serve well in the face of some blockchain developers&#x00027; claims to offer trustworthy, immutable record keeping. If the existing institutions of public record keeping are to be replaced or overthrown, with implications for political power and juridical legitimacy, not to mention the rights, entitlements, claims and identities of individual people, then a critical examination of the evidentiary quality offered by any replacement systems of record keeping is in order so as to avoid swapping one untrusted system of record keeping with another. With this goal in mind, the observations that follow are based on an analysis of a number of different blockchain systems designed for record keeping use cases, such as land title recording, health record keeping and identity management, which draw upon the principles and techniques of documentary critical analysis (i.e., diplomatics) developed by Mabillon and elaborated upon by many archival theorists since then (see e.g., Duranti, <xref ref-type="bibr" rid="B27">1998</xref>; Storch, <xref ref-type="bibr" rid="B72">1998</xref>; Duranti and Michetti, <xref ref-type="bibr" rid="B29">2012</xref>).</p>
<p>In distributed computing technologies records are distributed across infrastructural and system components. Though scattered, in most of these distributed systems&#x02014;like cloud computing, for example&#x02014;a record remains a largely unitary object: a single digital file (with attached metadata) or a composite Binary Large Object (BLOB). Most of a record&#x00027;s intellectual elements travel through space and time together, even if the software required to render the object accessible and interpretable does not (i.e., the object must be transformed in a way that renders it readable and presentable with new technology through processes of digital preservation).</p>
<p>This is not so in the case of records generated and recorded using blockchain technology. In blockchain-based record keeping, the intellectual aspects of the record are rendered as many distinct components, often existing in technical systems under autonomous and geographically distributed control. As a consequence, it may be very difficult to establish the authenticity of a record and to use it as trustworthy evidence of juridical acts. A high-level diplomatic analysis, drawing upon concepts first articulated by Mabillon, serves to illustrate the point.</p>
<p>The &#x0201C;Protocol&#x0201D; of a record typically begins with entitling&#x02014;in modern terms the letterhead, containing the name, title, capacity, and address of the person who issued the document (Storch, <xref ref-type="bibr" rid="B72">1998</xref>). This has no real equivalent in the blockchain world since most blockchains are designed to operate pseudonymously. In some cases, a blockchain address can serve the same purpose as entitling, at least in a partial way. The title of a record is an indication of the action of the subject (Storch, <xref ref-type="bibr" rid="B72">1998</xref>). It is essential to identify and disambiguate one record from another, a crucial part of being able to establish authenticity (because you cannot prove an entity authentic if you cannot differentiate its identity from the identity of that which you are proving is inauthentic). This intellectual component is often completely missing from blockchain records, though it may be gleaned from some elements of the text if not encrypted. In some blockchains, this may be provided by the use of signed schemas that link the ledger record back to an ontology from which its semantic meaning can be inferred (Lemieux and Sporny, <xref ref-type="bibr" rid="B52">2017</xref>). Dates are an important part of putting records that express contracts or rights and entitlements into force, and may refer to both the chronological date and the topical date or place where the document was issued (Storch, <xref ref-type="bibr" rid="B72">1998</xref>). In blockchain record keeping solutions, dating of a record is often achieved by the embedded timestamp in the block header, but also by the publishing of hashes in external reference sources, such as newspapers or social media (Anduck, <xref ref-type="bibr" rid="B3">2018</xref>). In contractual documents, the superscription is the mention of the first party by name (Storch, <xref ref-type="bibr" rid="B72">1998</xref>). Of course, parties are not identified by name in blockchain transactions but are only known by their addresses which, depending on the type of blockchain and its design, may or may not be associated with a legal or digital identity. It is often the case, however, that identifying information may be embedded as clear text into transactions i.e., in OpCodes or in unused multisig fields (Sward et al., <xref ref-type="bibr" rid="B74">2018</xref>). The inscription, in an epistolary or letter form, is the name, title, and address of the addressee (Storch, <xref ref-type="bibr" rid="B72">1998</xref>). In a contractual document, it is the mention by name of any party but the first party. Similar to identification of first parties, other parties in a record are not identified by name in blockchain transactions but are only known by their blockchain addresses, unless such information has been specifically inserted into a blockchain transaction by some means. The subject of a record&#x02014;often preceded in modern documents by the indicator, &#x0201C;in reference to&#x0201D; or &#x0201C;re&#x0201D; (Storch, <xref ref-type="bibr" rid="B72">1998</xref>)&#x02014;is often only identified by inference in blockchain solutions, that is, by means of a blockchain only being used for a single purpose, such as supply chain management in the production of coffee beans, or because some explanatory cleartext has been embedded into a transaction (see e.g., Flores et al., <xref ref-type="bibr" rid="B32">2018</xref>).</p>
<p>The written body of a document usually contains a preamble and other elements, such as clauses (Storch, <xref ref-type="bibr" rid="B72">1998</xref>). Preambles typically provide the motivation for the action, and its ethical or juridical principle (Storch, <xref ref-type="bibr" rid="B72">1998</xref>). In modern documents this section may contain a citation of the laws or regulations which pertain to the document or mandate its creation (Storch, <xref ref-type="bibr" rid="B72">1998</xref>). It is not found in records entered into most blockchain solutions, unless embedded into smart contracts or transactions using opcodes or unused multisig fields (Flores et al., <xref ref-type="bibr" rid="B32">2018</xref>). Notifications communicate that the transaction has been communicated to interested parties that must be made aware of its real-world outcomes (Storch, <xref ref-type="bibr" rid="B72">1998</xref>). It usually begins with the phrase, &#x0201C;be it known&#x0201D; or &#x0201C;know you&#x0201D; (Storch, <xref ref-type="bibr" rid="B72">1998</xref>). In blockchain records, this is not explicitly included in the intellectual content of the record; rather, it may be implied by the act of entering a &#x0201C;proof of fact&#x0201D; into the ledger, as in the case of an artwork that an individual may wish to assert is their creation and for which they are claiming intellectual property rights or other provenance tracking use case (see e.g., Kim and Laskowski, <xref ref-type="bibr" rid="B46">2018</xref>). Also, not evident in blockchain records is the exposition&#x02014;the narration of the concrete and immediate circumstances generating the act and/or the document (Storch, <xref ref-type="bibr" rid="B72">1998</xref>). In contemporary documents it often begins with &#x0201C;whereas&#x0201D; (Storch, <xref ref-type="bibr" rid="B72">1998</xref>). The part of the record known as the disposition contains the expression of an author&#x00027;s will or judgement and communicates the nature of the action and the function of the document. This is often not evident in blockchain records either, which only show that an act has been carried out. It must often be inferred from supporting documents kept elsewhere (Flores et al., <xref ref-type="bibr" rid="B32">2018</xref>). In some cases, explanatory text may be embedded in opcode/multisig fields but often this is just a hash link out to supporting documents (Flores et al., <xref ref-type="bibr" rid="B32">2018</xref>; Sward et al., <xref ref-type="bibr" rid="B74">2018</xref>), as one might expect of a simple ledger. Without this element the semantics of the record cannot be determined or instantiated, and its usefulness as evidence is limited (since it is impossible to determine what action the document actually represents without reference to the supporting documents). Finally, most traditional records contain formulaic phrases&#x02014;called clauses&#x02014;which ensure the execution of an act, guarantee its validity, protect against violation, preserve the rights of third parties, and indicate the means by which the document has value as evidence (Storch, <xref ref-type="bibr" rid="B72">1998</xref>). Clauses also enunciate the means used to validate the document and guarantee its authenticity. In blockchain record keeping, this is handled very differently, being almost entirely determined by the consensus mechanism and how it operates to ensure records are valid and well-ordered before the ledger is updated (see e.g., Narayanan et al., <xref ref-type="bibr" rid="B61">2016</xref>).</p>
<p>The eschatocol of a record contains the elements which authenticate the document: the means of its validation, an indication of responsibilities for documentation, and the final formulae (Storch, <xref ref-type="bibr" rid="B72">1998</xref>). In this aspect of the intellectual components of a blockchain record, it is possible to see many differences from traditional paper or digital records. Traditionally, records contain attestations, which are a means used to validate a document. These usually take the form of the signature of those who took part in issuing it: the author, writer, and countersigner (Storch, <xref ref-type="bibr" rid="B72">1998</xref>). In blockchain records, however, attestations take the form of the digital signature that the addresser of a transaction produces by signing the transaction with their private key. In traditional documents, there may also be a qualification of signature that will mention the title and official or juridical capacity of the signer (e.g., Queen&#x00027;s representative, President of the Republic, etc.) (Storch, <xref ref-type="bibr" rid="B72">1998</xref>). This is usually not provided in blockchain record keeping, since blockchain systems operate pseudonymously. However, in some blockchains, such as Hyperledger Indy, where there are &#x0201C;Trust Anchors&#x0201D; and &#x0201C;Issuers&#x0201D; of credentials, this type of attestation may be represented by the public key of the trusted issuer of a credential (see <xref ref-type="fig" rid="F1">Figure 1</xref> and Hyperledger Indy, <xref ref-type="bibr" rid="B41">2018</xref>) Traditional documents may also contain secretarial notes&#x02014;the initials of the typist, mention of enclosures, and an indication that other persons have received copies of the document (Storch, <xref ref-type="bibr" rid="B72">1998</xref>). Such information may be found in opcodes or the use of unused signature fields (Sward et al., <xref ref-type="bibr" rid="B74">2018</xref>). Formal public documents are also known to contain <italic>formula perpetuitatis</italic> declaring that the rights put into existence by the document are not circumscribed by time (Storch, <xref ref-type="bibr" rid="B72">1998</xref>). In blockchain ledgers, this aspect is implied by the very act of recording a transaction on an &#x0201C;immutable ledger.&#x0201D; Finally, traditional records will often end with a corroboration that enunciates the means used to validate the document and guarantee its authenticity (Storch, <xref ref-type="bibr" rid="B72">1998</xref>). In blockchain record keeping, this may be spelled out in a whitepaper or other technical document that explains how the system operates, specifically, an explanation of the consensus mechanism (see e.g., Nakamoto, <xref ref-type="bibr" rid="B59">2008</xref>). In Bitcoin, this may also be represented by SegWit which includes witness data stored at the end of a transaction as a list (Trubetskoy, <xref ref-type="bibr" rid="B77">2017</xref>).</p>
<fig id="F1" position="float">
<label>Figure 1</label>
<caption><p>Example of a credential schema signed by an issuer in Hyperledger Indy (source: original screenshot for Hyperledger Indy blockchain prototype).</p></caption>
<graphic xlink:href="fbloc-02-00005-g0001.tif"/>
</fig>
<p>The point of this analysis is not to hold blockchain records to the same standard as medieval or even contemporary record making and keeping, nor to find blockchain records wanting if they lack elements of early documentation. Rather, the purpose is to note that many intellectual elements of records traditionally used to understand and authenticate them have been transformed by the application of blockchain technology. It is necessary, therefore, to critically analyze blockchain records, just as Mabillon studied medieval records, in order to be able to determine their authenticity and trustworthiness. Blanket statements about the reliability and authenticity of blockchain records are likely to be inaccurate or unsatisfactory until this analytic work is done.</p>
<p>With respect to accuracy of records, evidence supports the assertion that blockchain ledgers will only be accurate to the extent that creators of records are motivated to, and processes of records creation, produce accurate records. In other words, there is nothing inherent in blockchain systems that makes records <italic>ipso facto</italic> any more or less accurate. Concern about the accuracy of records comes as a result of claims about the accuracy of blockchain record keeping systems, such as in the quote from Brian Deery of Factom <italic>supra</italic>, when such a presumption cannot be made alone on the basis of making an entry into a blockchain ledger. Additional checks of the accuracy of the original records, the security of the record&#x00027;s transmission to the blockchain, and the ongoing integrity of the records to ensure, at the point of creation, or subsequently determined through examination of the records, would need to be made. With respect to reliability, there may exist in any given blockchain solution, a number of problematic aspects of the processes of records creation, any of which may impact upon the reliability of ledger records. The degree of reliability of records often is based on three key factors: (1) the degree of control exercised over the procedure of creation, (2) the degree of control exercized by the authors, and (3) the degree of completeness of the documents themselves (Duranti, <xref ref-type="bibr" rid="B28">2007</xref>). While, in some of the use cases we have studied, there exist well-defined and documented procedures for the creation of records, whether these processes are manual or automated, the introduction of blockchain technology presents a new dimension that is not yet fully incorporated procedurally (Flores et al., <xref ref-type="bibr" rid="B32">2018</xref>). To illustrate, in the pilot of a blockchain system for land transaction recording in Brazil, the blockchain record keeping system was running in parallel to the existing registry system. In addition, the pilot involved transcribing existing records into the new blockchain ledger. We noted that this could result in inconsistency between the versions of land titles found in the parallel systems (i.e., the original registry and the blockchain ledger), presenting the opportunity to dispute the legitimacy of one or the other record (Lemieux, <xref ref-type="bibr" rid="B49">2017</xref>; Flores et al., <xref ref-type="bibr" rid="B32">2018</xref>).</p>
<p>In terms of the authority of the records creator, it is not always clear who is the authority with competence to enact a transaction, and moreover, if that authority was actually competent to enact it (e.g., able to consent to use of health data). Uncertainty surrounding the question of competence exists in blockchain record keeping environments because addresses might not be explicitly linked to the legal identity of a competent juridical authority (Nakamoto, <xref ref-type="bibr" rid="B59">2008</xref>; Flores et al., <xref ref-type="bibr" rid="B32">2018</xref>). Indeed, in permissionless, public blockchains, the legal identity of the transacting party is not linked to the transacting address and legal entities (persons, corporations, etc.) and real-world entities (e.g., services, machines) operate pseudonymously (Nakamoto, <xref ref-type="bibr" rid="B59">2008</xref>; Narayanan et al., <xref ref-type="bibr" rid="B61">2016</xref>). In many cases (e.g., Monero<xref ref-type="fn" rid="fn0002"><sup>2</sup></xref>), pains are taken to deliberately mask the source of the originating address, and thus, the real-world or legal identity of the transacting party, in order to protect privacy (Miers, <xref ref-type="bibr" rid="B57">2018</xref>). As a result, in such systems, it is safe to say that determinations of competence can remain murky. It is possible to clarify the question of competence in the design of blockchain systems, however. For example, we have observed two design alternatives thus far: the blockchain could require identification and authentication, as is the case in permissioned blockchains, to make it easier to link a real world and/or legal identity of an entity to a blockchain address (Hofman et al., <xref ref-type="bibr" rid="B39">2018</xref>). Another approach is to capture real-world and/or legal identity as metadata within a blockchain transaction or as a link within a transaction out to an external data store with this information, preferably in encrypted form to protect personally identifiable information and privacy (Flores et al., <xref ref-type="bibr" rid="B32">2018</xref>). Each design choice has its pros and cons in relation to the operation of the system, and compliance, for example, with privacy regulations.</p>
<p>A second issue concerning competence relates to proving that a transacting party is, indeed, competent to engage in a transaction. To the best of our knowledge, this is not a determination that can be made simply by examining the records or the record keeping system itself, whether or not it is a blockchain record keeping system (Lemieux, <xref ref-type="bibr" rid="B49">2017</xref>). It must be determined by examining facts surrounding the context of records creation (Flores et al., <xref ref-type="bibr" rid="B32">2018</xref>). Typically, however, in a traditional record keeping environment, attestations about the competence of the transacting party are made by means of witnessing the signature (Storch, <xref ref-type="bibr" rid="B72">1998</xref>). Thus, we surmise that a similar approach could be used in blockchain systems by employing &#x0201C;multisig,&#x0201D; the use of multiple signatures on records created using blockchain systems, whenever it is especially important to demonstrate competence (e.g., the production of legally binding smart contracts) (Lemieux, <xref ref-type="bibr" rid="B49">2017</xref>; Flores et al., <xref ref-type="bibr" rid="B32">2018</xref>).</p>
<p>Case studies to date reveal that the absence of well-defined procedural controls over records creation processes using blockchains means that completeness is difficult to determine and not well-defined. For example, questions arise in a blockchain record keeping environment as to whether transactions expressed as smart contracts should be considered complete when a transaction record is digitally signed, when that record is validated and entered into a blockchain ledger, or when the ledger entry has been confirmed and updated by the number of nodes determined to be sufficient to avoid repudiation. These are important distinctions, especially when blockchain records represent contractual agreements that may be considered legally binding, as in the case of consent and access to use of health records, or in conferring rights and entitlements, such as in the case of land transfers. Determination of whether, and at which point, a transaction can be considered complete and having entered into effect is often very significant in settling legal disputes. Much more clarity is needed therefore around the status of transmission of a record, and of its processing and transformation, as it moves through recording processes that involve blockchain record keeping.</p>
<p>With respect to authenticity&#x02014;the trustworthiness of a record as a record&#x02014;most blockchain solution developers understand authenticity in terms of integrity (Higgins, <xref ref-type="bibr" rid="B38">2014</xref>; Lemieux, <xref ref-type="bibr" rid="B48">2016</xref>). As Cohen observes, however, &#x0201C;[t]he notion that using cryptographic checksums to verify the lack of alteration of a bit sequence does not even begin to address the issues of authenticity of a record in presentation and in reliability in the sense of relationship to original writing or any sort of ground truth. Causality works differently&#x0201D; (Cohen, <xref ref-type="bibr" rid="B15">2015</xref>, p. 357&#x02013;358). Indeed, it is usual for record keepers to have to transform the bit structure and make modifications to records, from time to time, in order to preserve them or render them as accessible using updated technical systems over long periods of time (ISO/IEC, <xref ref-type="bibr" rid="B42">2012</xref>). Such changes would completely invalidate the hashes of the originating records stored in a blockchain system and would thus make it impossible to use them to subsequently check the integrity of the record (Lemieux, <xref ref-type="bibr" rid="B48">2016</xref>).</p>
<p>Blockchain systems typically miss instantiating the archival bond as well. The archival bond establishes the unique identity of a record by linking the content of a document to the context of the juridical transactions that give rise to the record&#x00027;s existence, and to other records created in the same context (Cencetti, <xref ref-type="bibr" rid="B13">1970</xref>). It is the link back to the source of a record&#x00027;s power. This linkage also enables a record to serve as evidence of the juridical context to which it is connected. In traditional, centralized digital record keeping systems, the archival bond is instantiated by associating descriptive metadata, such as a classification code that intellectually connects the record with its transactional context. Typically, the archival bond is not instantiated in blockchain systems, likely because developers are unaware of its importance in relation to establishing the authenticity of records and the provision of evidence. Moreover, it is mistaken to think that because every block of transactions (and thereby every transaction) in a blockchain is chained together in a time-ordered sequence that the archival bond is instantiated and preserved. The formation of blocks is agnostic to the context of the records, with blocks forming not on the basis of shared procedural origins but rather on the basis of time of entry into the ledger. Contextual information needed to establish the provenance (in an archival sense) and unique identity of ledger records therefore may not exist or be disconnected from the records (Lemieux and Sporny, <xref ref-type="bibr" rid="B52">2017</xref>), which ultimately may render the information quite useless as evidence. There are ways to instantiate the archival bond in blockchain systems to overcome this weakness: Lemieux and Sporny (<xref ref-type="bibr" rid="B52">2017</xref>) propose embedding hash links within blockchain transaction records in order to create a bond between a ledger entry and an ontology that can later be used to interpret the semantics of the entry and identify its transactional context. Another solution that has been used is to apply the Colored Coins protocol which tags the transaction record in a way that allows it to be identified with the transactional context of its creation (Flores et al., <xref ref-type="bibr" rid="B32">2018</xref>). Still another option is to use the blockchain only for the creation and keeping of records concerning a specific procedure, such as land transaction recording. This approach would likely require using a private, permissioned blockchain wherein the application of the system is pre-determined and controlled, in contrast to any of the large public blockchains which would, by their nature, always accept a variety of procedurally diverse transactions.</p>
<p>Similarly, determining the genuineness of the author of a record may prove challenging, since in public, permissionless blockchains there is no explicit and stable link between a transacting address and a legal or real-world entity. There are ways to trace transactions back to their likely author, such as those used by law enforcement agencies investigating crimes, but they require a good deal of sleuthing and are not guaranteed to produce results, especially since developers of public, permissionless blockchains are very concerned about protecting the privacy of transacting parties and are constantly developing new ways to protect identity (M&#x000F6;ser et al., <xref ref-type="bibr" rid="B58">2018</xref>; Naqvi, <xref ref-type="bibr" rid="B60">2018</xref>). In private, permissioned blockchains, it would be no more difficult to identify the author of a record than would be the case in any other digital record keeping system, since such systems routinely employ identification and authentication as part of their design.</p>
<p>As the above analysis suggests, many of the traditional methods which record creators and keepers have used to assure the accuracy, reliability and authenticity of records to best enable records to serve as trustworthy evidence have not yet been adapted to blockchain record keeping (see <xref ref-type="fig" rid="F2">Figure 2</xref>). Where previously the evidentiary quality of records was aided by physically signing and dating documents, registering them, and placing them in proximity to one another within a file folder or registry, in a blockchain environment, the signatures are digital, dates are replaced with computer-generated timestamps, registration is transformed into cryptographic hashes, and physical proximity of records becomes linked transactions, chained together into blocks over a decentralized network (Lemieux, <xref ref-type="bibr" rid="B51">2018</xref>). Transformations in the modality of records creation and keeping require a rethinking of what is required for the production of accurate, reliable and authentic records using blockchain technology. At this point in time, archives and records professionals are only beginning to ponder this.</p>
<fig id="F2" position="float">
<label>Figure 2</label>
<caption><p>A taxonomy of key archival concepts and their relationship to trust (source: reproduced from Hofman et al., <xref ref-type="bibr" rid="B39">2018</xref>).</p></caption>
<graphic xlink:href="fbloc-02-00005-g0002.tif"/>
</fig></sec>
<sec id="s6">
<title>6. A Self-Sovereign Future: From Temples to Prisons?</title>
<p>The association of traditional archives and public registries with existing, often mistrusted, power structures has led many to call for a reconfiguration of record keeping, whether public or private, from a centralized model to a radically decentralized model that puts ownership, custody and control of records into the hands of individuals, a model that some refer to as data self-sovereignty or informational self-determination (Allen, <xref ref-type="bibr" rid="B1">2016</xref>; Baars, <xref ref-type="bibr" rid="B6">2016</xref>). This has found greatest expression in calls for the protection of individual&#x00027;s personal privacy, as in Hughes&#x00027; Cypherpunk Manifesto, and more recently, Christopher Allen&#x00027;s (<xref ref-type="bibr" rid="B1">2016</xref>) ten principles of self-sovereign identity, as a direct response to the aggregation and exploitation of individuals&#x00027; personally identifiable information.</p>
<p>In his essay, &#x0201C;Life with Alacrity&#x0201D;, Allen (<xref ref-type="bibr" rid="B1">2016</xref>) recounts the history of identity on the internet in four phases: (1) the Internet&#x00027;s early days of centralized authorities who became the issuers and authenticators of digital identity (e.g., IANA, which determined the validity of IP addresses and ICANN, which arbitrated domain names); (2) beginning in 1995, certificate authorities (CAs) that helped Internet commerce sites prove identity; (3) the establishment of hierarchies within these organizations; and (4) the establishment of root controllers that could confer rights upon organizations to each oversee their own hierarchy. Allen points out that gradual decentralization of control of digital identity in the online world did not truly decentralize power, however, because users remained beholden to a single root authority that could deny their identity or even confirm a false identity (Allen, <xref ref-type="bibr" rid="B1">2016</xref>). With the self-sovereign identity that blockchain enables, Allen sees the possibility of escaping reliance upon such root authenticators of identity.</p>
<p>Similarly, archival software developer Peter Van Garderen (<xref ref-type="bibr" rid="B79">2016</xref>) has put forth a vision of self-sovereign data and posited the notion of &#x0201C;decentralized autonomous collections&#x0201D; (DACs). Van Garderen defines DACs as &#x0201C;a set of digital information objects stored for ongoing re-use with the means and incentives for independent parties to participate in the contribution, presentation, and curation of the information objects outside the control of an exclusive custodian.&#x0201D; Van Garderen&#x00027;s proposal sees DACs as an antidote to a number of the problems associated with traditional, centralized institutional repositories: shortage of resources, political interference, and elitism. For Van Garderen, blockchain technology has the potential to displace traditional institutional archives as curators of digital content (Van Garderen, <xref ref-type="bibr" rid="B79">2016</xref>).</p>
<p>Whether blockchain platforms and solutions as currently implemented can easily fulfill the vision of providing individuals with the true power of meaningful data self-sovereignty, informational self-determination and political exit remains an open question. So far, there are open source or proprietary blockchain platforms in which individuals may choose to record transactions (e.g., BitNation). While individuals may choose to use a public blockchain to record their marriage certificates, land titles, or other documents rather than a traditional public registry, the problem is that this may be where choice ends. Once relying upon these systems, there may be no opportunity for individuals to remove their documentation to another platform or to exercise a &#x0201C;right to be forgotten&#x0201D; (Gabison, <xref ref-type="bibr" rid="B34">2016</xref>), particularly if they disagree with the rules of governance (Alston, <xref ref-type="bibr" rid="B2">2019</xref>). These solutions lack both the means to give users portability&#x02014;the notion that information and services about identity [or personally identifiable information (PII)] must be transferable&#x02014;or support for systems interoperability&#x02014;the notion that individuals&#x00027; identities (or PII) must be as widely usable by them as possible. Thus, individuals may be as locked in as they would be had they entered their data into a traditional repository operated by a central authority, perhaps even more so, as at least traditional centralized repositories fall under the purview of an array of privacy laws and regulations that require &#x0201C;information controllers&#x0201D; to meet specified requirements for processing of PII and provide &#x0201C;data subjects&#x0201D; with some rights and protections. Allen (<xref ref-type="bibr" rid="B1">2016</xref>) explains the problem that arises when identity records are held and authenticated by a singular third-party entity: such entities can disappear&#x02014;and on the Internet, most eventually do. Outside of the online world, political regimes change and users may be forced to flee or move to different jurisdictions, leaving behind identity records. Allen argues, therefore, that a twenty-first century digital identity system must make authentic identity information widely available, crossing international boundaries to create global identities, without losing user control (Allen, <xref ref-type="bibr" rid="B1">2016</xref>). The key is to give individuals ownership, custody, control, and choice&#x02014;real choice.</p>
<p>These challenges cannot be overcome with existing blockchain governance arrangements. Angela Walch (<xref ref-type="bibr" rid="B81">2015</xref>) notes that even public blockchain platforms and systems are run by a small cadre of developers who, despite the decentralized nature of blockchain technology, often assume the mantel of and wield an increasing amount of power. Walch, observes of Bitcoin that it operates in a rather contradictory way&#x02014;it is decentralized in some ways but not in others and because there is no &#x0201C;official&#x0201D; power structure, it is not possible to hold those in power accountable for their actions (Walch, <xref ref-type="bibr" rid="B81">2015</xref>). Private or consortium-style blockchains may be even less likely to encourage portability and interoperability. Indeed, some solutions may actively discourage such capabilities for economic reasons (i.e., protecting intellectual property, client &#x0201C;capture,&#x0201D; etc.). Put simply, it may not be in the interests of those who currently hold power to reconfigure and redistribute power out into the hands of individuals. As in so much of the case with blockchain technology, the solution may lie in coming up with creative ways to incentivize these socio-economic actors to push power out to the edges, but this has not happened yet.</p>
<p>Thus, as Atzori posits, there is a real danger of a future state emerging that looks like Neal Stephenson&#x00027;s &#x0201C;Franchulates&#x0201D; (Atzori, <xref ref-type="bibr" rid="B4">2015</xref>; Swan, <xref ref-type="bibr" rid="B73">2015</xref>). Franchulates are a combination of &#x0201C;franchise&#x0201D; and &#x0201C;consulate&#x0201D; in which public policy has been replaced by business membership and private corporations have replaced the State in all its functions, competing with each other to provide goods and services (Atzori, <xref ref-type="bibr" rid="B4">2015</xref>). Atzori paints a bleak picture of this future state, suggesting that it would disrupt nation-state constitutions and deprive citizens of their rights (Atzori, <xref ref-type="bibr" rid="B4">2015</xref>). Atzori concludes that: &#x0201C;It is the conscientious application of principles and rights enshrined in law that can really empower individuals&#x02014;rather than the privatization of government services through market driven decentralized platforms&#x0201D; [(Atzori, <xref ref-type="bibr" rid="B4">2015</xref>), p. 32].</p>
<p>Even if a Franchulate model is avoided, and power is redistributed successfully to individuals who are self-sovereign owners of their own identities and data, there is another challenge that rears its head: persistence&#x02014;identities should last forever. Though private keys might need to be rotated and data might need to be changed, the identity should remain. Allen (<xref ref-type="bibr" rid="B1">2016</xref>) suggests that this goal may not be entirely reasonable in the fast-paced online world, so at the least identities should last until they&#x00027;ve been outdated by newer identity systems. In addition, he suggests that users should be able to dispose of an identity if they wish, and claims based on identities should be modified or removed as appropriate over time in order to respect the &#x0201C;right to be forgotten&#x0201D; (Allen, <xref ref-type="bibr" rid="B1">2016</xref>). There are two interconnected aspects to this challenge: (1) what should be made persistent and be preserved, and who decides, and (2) how to achieve persistence and for how long.</p>
<p>On the question of what should be made persistent and preserved, and who decides, Allen places the rights of users above all others. As such, the user should, at all times, decide how long an identity would last and how and when to dispose of it. This assumes that users are always competent to make those decisions, and that such decisions are always well-planned. As the recent case of crypto-currency exchange QuadrigaCX CEO&#x00027;s sudden death reveals, this may not be a wise assumption to make, since none of us can predict the future (De, <xref ref-type="bibr" rid="B20">2019</xref>). If we suddenly become unable to manage our private keys, those who depend upon our identities or the claims supported by our identities, may be left stranded. We live in a world of relationships, a network of interdependent social, economic, and political relationships that are both created and inextricably bound together by records. Thus, if a user decides to dispose of an identity (or data) but another identity has a dependency on that identity (or data), ways must be found to allow for the continuation of the identity (or data) that has the dependent relationship. An example might be the dependence of a child&#x00027;s citizenship on the persistent identity (and citizenship documentation) of a parent. Moreover, there are not just hereditary or familial relationships, but community relationships to consider as well. A question arises as to how the interests of individual users should be weighed against those of the community. Different social groups will have very different answers to the question. For example, perpetrators of serious crimes may wish to assert a &#x0201C;right to be forgotten&#x0201D; but some may say that a broader social good is served by remembering the crimes of these individuals. Archivists also typically wrestle with the question of a future state &#x0201C;collective&#x0201D; interest in the preservation of cultural memory, but different groups may have different requirements for authenticity and evidentiality of social memory depending on their experience of the trustworthiness of the dominant culture (Battley, <xref ref-type="bibr" rid="B8">2019</xref>). How might these interests figure into the mix?</p>
<p>Even assuming society can answer these questions, if individuals hold and control access to their own identities and personal information, the technical challenges of digital preservation will be great, since current models of digital preservation, such as the Open Archival Information System (ISO/IEC, <xref ref-type="bibr" rid="B42">2012</xref>), are premised upon archival documents passing across &#x0201C;the archival threshold&#x0201D; into that special, centralized place where they will become inviolate and immutable memorials of human activity (i.e., archives). There are no guarantees that particular blockchain platforms will still be operative or even exist in the future (Atzori, <xref ref-type="bibr" rid="B4">2015</xref>). DuPont and Maurer (<xref ref-type="bibr" rid="B23">2015</xref>) further point out with respect to smart contracts that if the electronic network were shut off, or if everyone moved on to a new system, there is no backup to establish the existence (or execution) of these contracts. What happens to notions of archives as place and all the technical tools, techniques, principles, and practices that are premised upon this notion, when the conceptual framework of data ownership, custody, and control is entirely flipped on its head? There will be a need to radically rethink and transform digital preservation concepts for use in a world of data self-sovereignty and self-determination or be faced with a fragmented and confused public record with attendant possibilities for the unraveling of social, political, and economic cohesion. Collectively, we may be inclined to put off thinking about these issues; however, to avoid negative unintended consequences for the institutions that hold human social relations together, it would be better if we think about them now lest we find ourselves in record keeping prisons of our own making.</p></sec>
<sec sec-type="conclusions" id="s7">
<title>7. Conclusion</title>
<p>This paper has discussed blockchain technology as a record keeping system, linking record keeping to power of authority, veneration (temples), and control (prisons) that configure and reconfigure our social, economic, and political relations. It has discussed the ways that some blockchain developers construct blockchain technology as a mechanism to counter institutions and social actors that currently hold power, but whom are nowadays often viewed with mistrust. This analysis has sought to problematize claims that blockchain systems, at least in their current form, inherently address the ills of public record keeping, identifying shortcomings in the design, implementation and governance of blockchain platforms that fall short of the ideal of trustworthy public record keeping. This is not to suggest that existing public record keeping is without flaws, and that blockchain technology should be jettisoned as a possible means to address such flaws. However, while there are certainly many problems with existing public record keeping, especially in predatory states, and because of the privacy and security issues to which centralized record keeping gives rise, what the analysis presented in this paper suggests is that the road ahead for blockchain public record keeping is only partially constructed and requires major ongoing construction efforts to produce records that would be sufficiently trustworthy to truly serve as effective alternatives to state-backed public record keeping, or in other cases, to challenge the monopoly of the state over this function. Despite claims to the contrary, public blockchains also currently lack the juridical legitimacy needed to convey power, rights and entitlements and confer authenticity upon records simply by virtue of the records&#x00027; addition to the ledger in the same way that nation states have been able to confer a presumption of authenticity upon public records. Only time will tell if one or more of the public blockchains is able to gain the juridical power, authority, and veneration needed to become a new temple of public record keeping.</p></sec>
<sec id="s8">
<title>Author Contributions</title>
<p>The author confirms being the sole contributor of this work and has approved it for publication.</p>
<sec>
<title>Conflict of Interest Statement</title>
<p>The author declares that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.</p></sec></sec>
</body>
<back>
<ref-list>
<title>References</title>
<ref id="B1">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Allen</surname> <given-names>C.</given-names></name></person-group> (<year>2016</year>). <source>The Path to Self-Sovereign Identity. Life with Alacrity [blog]</source>. Available online at: <ext-link ext-link-type="uri" xlink:href="http://www.lifewithalacrity.com/2016/04/the-path-to-self-soverereign-identity.html">http://www.lifewithalacrity.com/2016/04/the-path-to-self-soverereign-identity.html</ext-link></citation></ref>
<ref id="B2">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Alston</surname> <given-names>E.</given-names></name></person-group> (<year>2019</year>). <source>Constitutions and Blockchains: Competitive Governance of Fundamental Rule Sets</source>. Working paper 2019.003. <publisher-name>Center for Growth and Opportunity, Utah State University</publisher-name>, <publisher-loc>Logan, UT</publisher-loc>.</citation></ref>
<ref id="B3">
<citation citation-type="web"><person-group person-group-type="author"><collab>Anduck</collab></person-group> (<year>2018</year>). <source>Blockchain in Words</source>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://bitcoinstrings.com">https://bitcoinstrings.com</ext-link></citation></ref>
<ref id="B4">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Atzori</surname> <given-names>M.</given-names></name></person-group> (<year>2015</year>). <source>Blockchain Technology and Decentralized Governance: Is the State Still Necessary?</source></citation></ref>
<ref id="B5">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Atzori</surname> <given-names>M.</given-names></name></person-group> (<year>2017</year>). <source>Blockchain Governance and the Role of Trust Service Providers: The TrustedChain&#x000AE; Network</source>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://trustedchain.it/wp-content/uploads/2017/11/ATZORI_-TrustedChainWhite-Paper.pdf">https://trustedchain.it/wp-content/uploads/2017/11/ATZORI_-TrustedChainWhite-Paper.pdf</ext-link></citation></ref>
<ref id="B6">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Baars</surname> <given-names>D.</given-names></name></person-group> (<year>2016</year>). <source>Towards Self-sovereign Identity Using Blockchain Technology</source> (Master&#x00027;s thesis). <publisher-name>University of Twente</publisher-name>, <publisher-loc>Enschede, Netherlands</publisher-loc>.</citation></ref>
<ref id="B7">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Bandyopadhyay</surname> <given-names>P.</given-names></name></person-group> (<year>2018</year>). <article-title>The origin of blockchain&#x02013;from cypherpunks to Satoshi to IBM</article-title>. <source>Medium</source>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://medium.com/datadriveninvestor/cypherpunks-to-satoshi-to-ibm-819ebcfdd674">https://medium.com/datadriveninvestor/cypherpunks-to-satoshi-to-ibm-819ebcfdd674</ext-link></citation></ref>
<ref id="B8">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Battley</surname> <given-names>B.</given-names></name></person-group> (<year>2019</year>). <article-title>Archives as places, places as archives: doors to privilege, places of connection or haunted sarcophagi of crumbling skeletons?</article-title> <source>Arch. Sci.</source> <volume>19</volume>, <fpage>1</fpage>&#x02013;<lpage>26</lpage>. <pub-id pub-id-type="doi">10.1007/s10502-019-09300-4</pub-id></citation></ref>
<ref id="B9">
<citation citation-type="web"><person-group person-group-type="author"><collab>Bitcoin Wiki</collab></person-group> (<year>2016</year>). <source>Confirmation [wiki]</source>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://en.bitcoin.it/wiki/Confirmation">https://en.bitcoin.it/wiki/Confirmation</ext-link></citation></ref>
<ref id="B10">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Blouin</surname> <given-names>F. X.</given-names> <suffix>Jr.</suffix></name> <name><surname>Rosenberg</surname> <given-names>W. G.</given-names></name></person-group> (<year>2012</year>). <source>Processing the Past: Contesting Authority in History and the Archives</source>. <publisher-loc>Oxford</publisher-loc>: <publisher-name>Oxford University Press</publisher-name>.</citation></ref>
<ref id="B11">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Brothman</surname> <given-names>B.</given-names></name></person-group> (<year>2001</year>). <article-title>The past that archives keep: memory, history, and the preservation of archival records</article-title>. <source>Archivaria</source> <volume>51</volume>, <fpage>48</fpage>&#x02013;<lpage>80</lpage>.</citation></ref>
<ref id="B12">
<citation citation-type="book"><person-group person-group-type="author"><collab>California Public Utilities Commission and Consumer Protection and Safety Division</collab></person-group> (<year>2012</year>). <article-title>Rebuttal Testimony to Pacific Gas and Electric Company&#x00027;s Response to the Consumer Protection and Safety Division&#x00027;s Report: Records Management With the Gas Transmission Division of PGE Prior to the Natural Gas Transmission Pipeline Rupture and Fire</article-title>, <publisher-loc>San Bruno, California</publisher-loc>.</citation></ref>
<ref id="B13">
<citation citation-type="book"><person-group person-group-type="editor"><name><surname>Cencetti</surname> <given-names>G.</given-names></name></person-group> (Ed.). (<year>1970</year>). <article-title>Il fondamento teorico della dottrin archivistica</article-title>, in <source>In Scritti Archivistici</source> (<publisher-loc>Rome</publisher-loc>: <publisher-name>Il Centro di Recerca</publisher-name>), <fpage>7</fpage>&#x02013;<lpage>13</lpage>.</citation></ref>
<ref id="B14">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Cobain</surname> <given-names>I.</given-names></name></person-group> (<year>2016</year>). <source>The History Thieves: Secrets, Lies and the Shaping of a Modern Nation</source>. <publisher-loc>London</publisher-loc>: <publisher-name>Portobello Books</publisher-name>.</citation></ref>
<ref id="B15">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Cohen</surname> <given-names>F.</given-names></name></person-group> (<year>2015</year>). <article-title>A tale of two traces&#x02013;diplomatics and forensics</article-title>, in <source>IFIP International Conference on Digital Forensics</source> (<publisher-loc>Cham</publisher-loc>: <publisher-name>Springer</publisher-name>), <fpage>3</fpage>&#x02013;<lpage>27</lpage>.</citation></ref>
<ref id="B16">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Condos</surname> <given-names>J.</given-names></name> <name><surname>Sorrell</surname> <given-names>W. H.</given-names></name> <name><surname>Donegan</surname> <given-names>S. L.</given-names></name></person-group> (<year>2016</year>). <source>Blockchain Technology: Opportunities and Risks</source>. Available online at: <ext-link ext-link-type="uri" xlink:href="http://legislature.vermont.gov/assets/Legislative-Reports/blockchain-technology-report-final.pdf">http://legislature.vermont.gov/assets/Legislative-Reports/blockchain-technology-report-final.pdf</ext-link></citation></ref>
<ref id="B17">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Cunningham</surname> <given-names>A.</given-names></name></person-group> (<year>2017</year>). <article-title>Archives as a place</article-title>, in <source>In Currents of Archival Thinking</source>, eds <person-group person-group-type="editor"><name><surname>MacNeil</surname> <given-names>H.</given-names></name> <name><surname>Eastwood</surname> <given-names>T.</given-names></name></person-group> (<publisher-loc>Toronto, ON</publisher-loc>: <publisher-name>Libraries Unlimited</publisher-name>), <fpage>53</fpage>&#x02013;<lpage>80</lpage>.</citation></ref>
<ref id="B18">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>De Filippi</surname> <given-names>P.</given-names></name></person-group> (<year>2018</year>). <source>Blockchain and the Law: The Rule of Code</source>. <publisher-loc>Boston, MA</publisher-loc>: <publisher-name>Harvard University Press</publisher-name>.</citation></ref>
<ref id="B19">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>De Soto</surname> <given-names>H.</given-names></name></person-group> (<year>2000</year>). <source>The Mystery of Capital: Why Capitalism Triumphs in the West and Fails Everywhere Else</source>. <publisher-loc>New York, NY</publisher-loc>: <publisher-name>Basic Civitas Books</publisher-name>.</citation></ref>
<ref id="B20">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>De</surname> <given-names>N.</given-names></name></person-group> (<year>2019</year>). <article-title>Quadrigacx owes customers 190 million court filing shows</article-title>. <source>Coindesk</source>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://www.coindesk.com/quadriga?creditor?protection?filing">https://www.coindesk.com/quadriga?creditor?protection?filing</ext-link></citation></ref>
<ref id="B21">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Derrida</surname> <given-names>J.</given-names></name></person-group> (<year>1996</year>). <source>Archive Fever: A Freudian Impression</source>. <publisher-loc>Chicago, IL</publisher-loc>: <publisher-name>University of Chicago Press</publisher-name>.</citation></ref>
<ref id="B22">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Deutch</surname> <given-names>J.</given-names></name> <name><surname>Habal</surname> <given-names>H.</given-names></name></person-group> (<year>2018</year>). <article-title>The syrian archive: a methodological case study of open-source investigation of state crime using video evidence from social media platforms</article-title>. <source>State Crime J.</source> <volume>7</volume>, <fpage>46</fpage>&#x02013;<lpage>76</lpage>. <pub-id pub-id-type="doi">10.13169/statecrime.7.1.0046</pub-id></citation></ref>
<ref id="B23">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>DuPont</surname> <given-names>Q.</given-names></name> <name><surname>Maurer</surname> <given-names>B.</given-names></name></person-group> (<year>2015</year>). <source>Ledgers and Law in the Blockchain. Kings Review</source>. Available online at: <ext-link ext-link-type="uri" xlink:href="http://kingsreview.co.uk/articles/ledgers-and-law-in-the-blockchain/">http://kingsreview.co.uk/articles/ledgers-and-law-in-the-blockchain/</ext-link></citation></ref>
<ref id="B24">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Duranti</surname> <given-names>L.</given-names></name></person-group> (<year>1989a</year>). <article-title>The odyssey of records managers: part 1: from the dawn of civilization to the fall of the roman empire</article-title>. <source>Inform. Manage.</source> <volume>23</volume>, <fpage>3</fpage>&#x02013;<lpage>11</lpage>.</citation></ref>
<ref id="B25">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Duranti</surname> <given-names>L.</given-names></name></person-group> (<year>1989b</year>). <article-title>The odyssey of records managers: part 2: from the middle A</article-title>. <source>Inform. Manage.</source> <volume>23</volume>:<fpage>3</fpage>.</citation></ref>
<ref id="B26">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Duranti</surname> <given-names>L.</given-names></name></person-group> (<year>1996</year>). <article-title>Archives as a place. [Paper presented at a half day seminar in Sydney on 19 October 1995.]</article-title>. <source>Arch. Manuscripts</source> <volume>24</volume>, <fpage>242</fpage>&#x02013;<lpage>255</lpage>.</citation></ref>
<ref id="B27">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Duranti</surname> <given-names>L.</given-names></name></person-group> (<year>1998</year>). <source>Diplomatics: New Uses for an Old Science</source>. <publisher-loc>Lanham, MD</publisher-loc>: <publisher-name>Scarecrow Press</publisher-name>.</citation></ref>
<ref id="B28">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Duranti</surname> <given-names>L.</given-names></name></person-group> (<year>2007</year>). <article-title>Archives as place</article-title>. <source>Arch. Soc. Stud.</source> <volume>1</volume>, <fpage>445</fpage>&#x02013;<lpage>466</lpage>.</citation></ref>
<ref id="B29">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Duranti</surname> <given-names>L.</given-names></name> <name><surname>Michetti</surname> <given-names>G.</given-names></name></person-group> (<year>2012</year>). <article-title>Archival method</article-title>, in <source>Archival Multiverse</source>, eds <person-group person-group-type="editor"><name><surname>Gilliland</surname> <given-names>A.</given-names></name> <name><surname>McKemmish</surname> <given-names>S.</given-names></name> <name><surname>Lau</surname> <given-names>A.</given-names></name></person-group> (<publisher-loc>Victoira</publisher-loc>: <publisher-name>Monash University Publishing</publisher-name>), <fpage>75</fpage>&#x02013;<lpage>95</lpage>.</citation></ref>
<ref id="B30">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Edwards</surname> <given-names>M.</given-names></name></person-group> (<year>2015</year>). <article-title>The trust deficit-concepts and causes of low public trust in governments</article-title>, in <source>United Nations Committee of Experts on Public Administration, Fourteenth Session</source> (<publisher-loc>New York, NY</publisher-loc>), <fpage>20</fpage>&#x02013;<lpage>24</lpage>.</citation></ref>
<ref id="B31">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Fisher</surname> <given-names>D.</given-names></name></person-group> (<year>2014</year>). <source>Cuba Opening Could Reopen Fight Over Billions in Seized Property</source>. <publisher-loc>Jersey City, NJ</publisher-loc>: <publisher-name>Forbes</publisher-name>.</citation></ref>
<ref id="B32">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Flores</surname> <given-names>D.</given-names></name> <name><surname>Lacombe</surname> <given-names>C.</given-names></name> <name><surname>Lemieux</surname> <given-names>V.</given-names></name></person-group> (<year>2018</year>). <source>Real Estate Transaction Recording in the Blockchain in Brazil (RCPLAC-01)&#x02013;Case Study 1</source>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://blogs.ubc.ca/recordsinthechain">https://blogs.ubc.ca/recordsinthechain</ext-link></citation></ref>
<ref id="B33">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Foucault</surname> <given-names>M.</given-names></name></person-group> (<year>1980</year>). <source>Power/Knowledge: Selected Interviews and Other Writings, 1972&#x02013;1977</source>. <publisher-loc>New York, NY</publisher-loc>: <publisher-name>Pantheon</publisher-name>.</citation></ref>
<ref id="B34">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Gabison</surname> <given-names>G.</given-names></name></person-group> (<year>2016</year>). <article-title>Policy considerations for the blockchain technology public and private applications</article-title>. <source>SMU Sci. Tech. L. Rev.</source> <volume>19</volume>:<fpage>327</fpage>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://scholar.smu.edu/scitech/vol19/iss3/4">https://scholar.smu.edu/scitech/vol19/iss3/4</ext-link></citation></ref>
<ref id="B35">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Gervais</surname> <given-names>A.</given-names></name> <name><surname>Karame</surname> <given-names>G.</given-names></name> <name><surname>Capkun</surname> <given-names>S.</given-names></name> <name><surname>Capkun</surname> <given-names>V.</given-names></name></person-group> (<year>2013</year>). <article-title>Is bitcoin a decentralized currency?</article-title> <source>IEEE Secur. Privacy</source> <volume>12</volume>, <fpage>54</fpage>&#x02013;<lpage>60</lpage>. <pub-id pub-id-type="doi">10.1109/MSP.2014.49</pub-id></citation></ref>
<ref id="B36">
<citation citation-type="book"><person-group person-group-type="editor"><name><surname>Hamilton</surname> <given-names>C.</given-names></name> <name><surname>Harris</surname> <given-names>V.</given-names></name> <name><surname>Taylor</surname> <given-names>J.</given-names></name> <name><surname>Pickover</surname> <given-names>M.</given-names></name> <name><surname>Reid</surname> <given-names>G.</given-names></name> <name><surname>Saleh</surname> <given-names>R.</given-names></name></person-group> (eds.). (<year>2005</year>). <source>Refiguring the Archive</source>. <publisher-loc>Dordrecht</publisher-loc>: <publisher-name>Springer</publisher-name>.</citation>
</ref>
<ref id="B37">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Head</surname> <given-names>R. C.</given-names></name></person-group> (<year>2013</year>). <article-title>Documents, archives, and proof around 1700</article-title>. <source>Hist. J.</source> <volume>56</volume>, <fpage>909</fpage>&#x02013;<lpage>930</lpage>. <pub-id pub-id-type="doi">10.1017/S0018246X12000477</pub-id></citation></ref>
<ref id="B38">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Higgins</surname> <given-names>S.</given-names></name></person-group> (<year>2014</year>). <article-title>Factom outlines record-keeping network that utilises bitcoin&#x00027;s blockchain</article-title>. <source>Coindesk</source>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://www.coindesk.com/factom-white-paper-outlines-record-keeping-layer-bitcoin">https://www.coindesk.com/factom-white-paper-outlines-record-keeping-layer-bitcoin</ext-link></citation></ref>
<ref id="B39">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Hofman</surname> <given-names>D.</given-names></name> <name><surname>Batista</surname> <given-names>D.</given-names></name> <name><surname>Lemieux</surname> <given-names>V. L.</given-names></name></person-group> (<year>2018</year>). <source>Centre of Excellence for the Prevention of Organ Failure (Proof)&#x02013;(RPCCA-01)&#x02013;Case Study 1</source>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://blogs.ubc.ca/recordsinthechain">https://blogs.ubc.ca/recordsinthechain</ext-link></citation></ref>
<ref id="B40">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Hughes</surname> <given-names>E.</given-names></name></person-group> (<year>1993</year>). <source>A Cypherpunk&#x00027;s Manifesto</source>. Available online at: <ext-link ext-link-type="uri" xlink:href="http://www.activism.net/cypherpunk/manifesto.html">http://www.activism.net/cypherpunk/manifesto.html</ext-link> (accessed August 3, 2004).</citation></ref>
<ref id="B41">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Indy</surname> <given-names>H.</given-names></name></person-group> (<year>2018</year>). <source>Getting Started With Indy</source>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://buildmedia.readthedocs.org/media/pdf/hyperledger-indy/docs/hyperledger-indy.pdf">https://buildmedia.readthedocs.org/media/pdf/hyperledger-indy/docs/hyperledger-indy.pdf</ext-link></citation></ref>
<ref id="B42">
<citation citation-type="book"><person-group person-group-type="author"><collab>ISO/IEC</collab></person-group> (<year>2012</year>). <source>ISO 14721: 2012&#x02013;Space Data and Information Transfer System&#x02013;Open Archival Information System (OAIS)&#x02013;Reference Model</source>. <publisher-loc>Geneva</publisher-loc>: <publisher-name>ISO</publisher-name>.</citation></ref>
<ref id="B43">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Jimerson</surname> <given-names>R. C.</given-names></name></person-group> (<year>2009</year>). <source>Archives Power: Memory, Accountability, and Social Justice</source>. <publisher-loc>Chicago, IL</publisher-loc>: <publisher-name>Society of American Archivists</publisher-name>.</citation></ref>
<ref id="B44">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Keele</surname> <given-names>L.</given-names></name></person-group> (<year>2007</year>). <article-title>Social capital and the dynamics of trust in government</article-title>. <source>Am. J. Polit. Sci.</source> <volume>51</volume>, <fpage>241</fpage>&#x02013;<lpage>254</lpage>. <pub-id pub-id-type="doi">10.1111/j.1540-5907.2007.00248.x</pub-id></citation></ref>
<ref id="B45">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Kenney</surname> <given-names>M.</given-names></name> <name><surname>Zysman</surname> <given-names>J.</given-names></name></person-group> (<year>2016</year>). <article-title>The rise of the platform economy</article-title>. <source>Issues Sci. Technol.</source> <volume>32</volume>, <fpage>61</fpage>&#x02013;<lpage>69</lpage>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://issues.org/the-rise-of-the-platform-economy/">https://issues.org/the-rise-of-the-platform-economy/</ext-link></citation></ref>
<ref id="B46">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Kim</surname> <given-names>H. M.</given-names></name> <name><surname>Laskowski</surname> <given-names>M.</given-names></name></person-group> (<year>2018</year>). <article-title>Toward an ontology-driven blockchain design for supply-chain provenance</article-title>. <source>Intell. Syst. Account. Finance Manag.</source> <volume>25</volume>, <fpage>18</fpage>&#x02013;<lpage>27</lpage>. <pub-id pub-id-type="doi">10.1002/isaf.1424</pub-id></citation></ref>
<ref id="B47">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Latour</surname> <given-names>B.</given-names></name></person-group> (<year>1986</year>). <article-title>Visualization and cognition</article-title>. <source>Knowl. Soc.</source> <volume>6</volume>, <fpage>1</fpage>&#x02013;<lpage>40</lpage>.</citation></ref>
<ref id="B48">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Lemieux</surname> <given-names>V. L.</given-names></name></person-group> (<year>2016</year>). <article-title>Trusting records: is blockchain technology the answer?</article-title> <source>Records Manage. J.</source> <volume>26</volume>, <fpage>110</fpage>&#x02013;<lpage>139</lpage>. <pub-id pub-id-type="doi">10.1108/RMJ-12-2015-0042</pub-id></citation></ref>
<ref id="B49">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Lemieux</surname> <given-names>V. L.</given-names></name></person-group> (<year>2017</year>). <article-title>Evaluating the use of blockchain in land transactions: an archival science perspective</article-title>. <source>Eur. Property Law J.</source> <volume>6</volume>, <fpage>392</fpage>&#x02013;<lpage>440</lpage>. <pub-id pub-id-type="doi">10.1515/eplj-2017-0019</pub-id></citation></ref>
<ref id="B51">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Lemieux</surname> <given-names>V. L.</given-names></name></person-group> (<year>2018</year>). <article-title>The future of arhives as networked, decentralized, autonomous and global</article-title>, in <source>Archival Futures</source>, ed <person-group person-group-type="editor"><name><surname>Brown</surname> <given-names>C.</given-names></name></person-group> (<publisher-loc>London</publisher-loc>: <publisher-name>Facet Publishing</publisher-name>), <fpage>7</fpage>&#x02013;<lpage>13</lpage>.</citation></ref>
<ref id="B52">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Lemieux</surname> <given-names>V. L.</given-names></name> <name><surname>Sporny</surname> <given-names>M.</given-names></name></person-group> (<year>2017</year>). <article-title>Preserving the archival bond in distributed ledgers: a data model and syntax</article-title>, in <source>Proceedings of the 26th International Conference on World Wide Web Companion</source> (<publisher-loc>Perth</publisher-loc>: <publisher-name>International World Wide Web Conferences Steering Committee</publisher-name>), <fpage>1437</fpage>&#x02013;<lpage>1443</lpage>.</citation></ref>
<ref id="B53">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Lemieux</surname> <given-names>V. L.</given-names></name> <name><surname>Trapnell</surname> <given-names>S. E.</given-names></name></person-group> (<year>2016</year>). <source>Public Access to Information for Development: A Guide to the Effective Implementation of Right to Information Laws</source>. <publisher-loc>Washington, DC</publisher-loc>: <publisher-name>The World Bank</publisher-name>.</citation></ref>
<ref id="B54">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Levi</surname> <given-names>M.</given-names></name> <name><surname>Stoker</surname> <given-names>L.</given-names></name></person-group> (<year>2000</year>). <article-title>Political trust and trustworthiness</article-title>. <source>Annu. Rev. Polit. Sci.</source> <volume>3</volume>, <fpage>475</fpage>&#x02013;<lpage>507</lpage>. <pub-id pub-id-type="doi">10.1146/annurev.polisci.3.1.475</pub-id></citation></ref>
<ref id="B55">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Mabillon</surname> <given-names>J.</given-names></name></person-group> (<year>2004</year>). <article-title>De re diplomatica</article-title>, in <source>Treatise on Monastic Studies</source>, ed <person-group person-group-type="editor"><name><surname>McDonald</surname> <given-names>J. P.</given-names></name></person-group> (<publisher-loc>Lanhan, MD</publisher-loc>: <publisher-name>University Press of America</publisher-name>).</citation></ref>
<ref id="B56">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Markey-Towler</surname> <given-names>B.</given-names></name></person-group> (<year>2018</year>). <article-title>Anarchy, blockchain and utopia: a theory of political-socioeconomic systems organised using blockchain</article-title>. <source>J. Br. Blockchain Assoc</source>. <volume>1</volume>:<fpage>13</fpage>. <pub-id pub-id-type="doi">10.31585/jbba-1-1(1)2018</pub-id></citation></ref>
<ref id="B57">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Miers</surname> <given-names>I.</given-names></name></person-group> (<year>2018</year>). <source>How Much Privacy is Enough? Threats, Scaling and Trade-offs in Blockchain Privacy Protocols. Scaling Bitcoin</source>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://www.reddit.com/r/pivx/comments/9m1cpa/howmuchprivacyisenoughthreatsscalingand/?depth=1">https://www.reddit.com/r/pivx/comments/9m1cpa/howmuchprivacyisenoughthreatsscalingand/?depth=1</ext-link></citation></ref>
<ref id="B58">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>M&#x000F6;ser</surname> <given-names>M.</given-names></name> <name><surname>Soska</surname> <given-names>K.</given-names></name> <name><surname>Heilman</surname> <given-names>E.</given-names></name> <name><surname>Lee</surname> <given-names>K.</given-names></name> <name><surname>Heffan</surname> <given-names>H.</given-names></name> <name><surname>Srivastava</surname> <given-names>S.</given-names></name> <etal/></person-group>. (<year>2018</year>). <article-title>An empirical analysis of traceability in the Monero blockchain</article-title>. <source>Proc. Privacy Enhancing Technol.</source> <volume>2018</volume>, <fpage>143</fpage>&#x02013;<lpage>163</lpage>. <pub-id pub-id-type="doi">10.1515/popets-2018-0025</pub-id></citation></ref>
<ref id="B59">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Nakamoto</surname> <given-names>S.</given-names></name></person-group> (<year>2008</year>). <source>Bitcoin: A Peer-to-Peer Electronic Cash System</source>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://bitcoin.org/bitcoin.pdf">https://bitcoin.org/bitcoin.pdf</ext-link>.</citation></ref>
<ref id="B60">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Naqvi</surname> <given-names>S.</given-names></name></person-group> (<year>2018</year>). <article-title>Challenges of cryptocurrencies forensics: a case study of investigating, evidencing and prosecuting organised cybercriminals</article-title>, in <source>Proceedings of the 13th International Conference on Availability, Reliability and Security</source>, <volume>63</volume>:<fpage>1</fpage>&#x02013;<lpage>63:5</lpage>. <pub-id pub-id-type="doi">10.1145/3230833.3233290</pub-id></citation></ref>
<ref id="B61">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Narayanan</surname> <given-names>A.</given-names></name> <name><surname>Bonneau</surname> <given-names>J.</given-names></name> <name><surname>Felten</surname> <given-names>E.</given-names></name> <name><surname>Miller</surname> <given-names>A.</given-names></name> <name><surname>Goldfeder</surname> <given-names>S.</given-names></name></person-group> (<year>2016</year>). <source>Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction</source>. <publisher-loc>Princeton, NJ</publisher-loc>: <publisher-name>Princeton University Press</publisher-name>.</citation></ref>
<ref id="B62">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Neuman</surname> <given-names>L.</given-names></name> <name><surname>Calland</surname> <given-names>R.</given-names></name></person-group> (<year>2007</year>). <source>Making the Access to Information Law Work: The Challenges of Implementation. The Right to Know</source>. <publisher-loc>New York, NY</publisher-loc>: <publisher-name>Columbia University Press</publisher-name>.</citation></ref>
<ref id="B63">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Orlikowski</surname> <given-names>W. J.</given-names></name></person-group> (<year>1992</year>). <article-title>The duality of technology: rethinking the concept of technology in organizations</article-title>. <source>Organ. Sci.</source> <volume>3</volume>, <fpage>398</fpage>&#x02013;<lpage>427</lpage>. <pub-id pub-id-type="doi">10.1287/orsc.3.3.398</pub-id></citation></ref>
<ref id="B64">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Peters</surname> <given-names>G. W.</given-names></name> <name><surname>Panayi</surname> <given-names>E.</given-names></name></person-group> (<year>2016</year>). <article-title>Understanding modern banking ledgers through blockchain technologies: Future of transaction processing and smart contracts on the internet of money</article-title>, in <source>Banking Beyond Banks and Money: A Guide to Banking Services in the Twenty-First Century</source>, eds <person-group person-group-type="editor"><name><surname>Tasca</surname> <given-names>P.</given-names></name> <name><surname>Tomaso</surname> <given-names>A.</given-names></name> <name><surname>Pelazzon</surname> <given-names>L.</given-names></name> <name><surname>Perony</surname> <given-names>N.</given-names></name></person-group> (<publisher-loc>Cham</publisher-loc>: <publisher-name>Springer</publisher-name>), <fpage>239</fpage>&#x02013;<lpage>278</lpage>.</citation></ref>
<ref id="B65">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Piore</surname> <given-names>A.</given-names></name></person-group> (<year>2018</year>). <source>How Blockchain Technology Could Help Us Take Back Our Data From Facebook, Google and Amazon. Newsweek</source>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://www.newsweek.com/2018/11/16/new-internet-blockchain-technology-could-help-us-take-back-our-data-facebook-1222860.html">https://www.newsweek.com/2018/11/16/new-internet-blockchain-technology-could-help-us-take-back-our-data-facebook-1222860.html</ext-link></citation></ref>
<ref id="B66">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Posner</surname> <given-names>E.</given-names></name></person-group> (<year>1972</year>). <source>Archives in the Ancient World</source>. <publisher-loc>Boston, MA</publisher-loc>: <publisher-name>Harvard University Press</publisher-name>.</citation></ref>
<ref id="B67">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Robinson</surname> <given-names>A.</given-names></name></person-group> (<year>1995</year>). <source>The Story of Writing: Alphabets, Hieroglyphs and Pictograms</source>. <publisher-loc>New York, NY</publisher-loc>: <publisher-name>Thames and Hudson</publisher-name>.</citation></ref>
<ref id="B68">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Seabury</surname> <given-names>P.</given-names></name> <name><surname>McDougall</surname> <given-names>W. A.</given-names></name></person-group> (<year>1984</year>). <source>The Grenada Papers</source>. <publisher-loc>Washington, DC</publisher-loc>: <publisher-name>ICS Press</publisher-name>.</citation></ref>
<ref id="B69">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Sifry</surname> <given-names>M. L.</given-names></name></person-group> (<year>2011</year>). <source>WikiLeaks and the Age of Transparency</source>. <publisher-loc>New York, NY</publisher-loc>: <publisher-name>OR Books</publisher-name>.</citation></ref>
<ref id="B70">
<citation citation-type="web"><person-group person-group-type="author"><collab>State of Arizona</collab></person-group> (<year>2017</year>). <source>Chapter 97, Title 44, Section 7061. Signatures; Electronic Transactions; Blockchain Technology</source>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://legiscan.com/AZ/text/HB2417/id/1588180/Arizona-2017-HB2417-Chaptered.html">https://legiscan.com/AZ/text/HB2417/id/1588180/Arizona-2017-HB2417-Chaptered.html</ext-link> (accessed March 29, 2017).</citation></ref>
<ref id="B71">
<citation citation-type="web"><person-group person-group-type="author"><collab>State of Vermont</collab></person-group> (<year>2016</year>). <source>Act 157, Sec. I.1. 12 V.S.A. &#x000A7; 1913. An Act Relating to Miscellaneous Economic Development Provisions</source>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://legislature.vermont.gov/assets/Documents/2016/Docs/ACTS/ACT157/ACT157%20As%20Enacted.pdf">https://legislature.vermont.gov/assets/Documents/2016/Docs/ACTS/ACT157/ACT157%20As%20Enacted.pdf</ext-link> (accessed July 1, 2016).</citation></ref>
<ref id="B72">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Storch</surname> <given-names>S.</given-names></name></person-group> (<year>1998</year>). <article-title>Diplomatics: modern archival method or medieval artifact</article-title>. <source>Am. Arch.</source> <volume>61</volume>, <fpage>365</fpage>&#x02013;<lpage>383</lpage>. <pub-id pub-id-type="doi">10.17723/aarc.61.2.h0358316qn85p2lm</pub-id></citation></ref>
<ref id="B73">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Swan</surname> <given-names>M.</given-names></name></person-group> (<year>2015</year>). <source>Blockchain: Blueprint for a New Economy</source>. <publisher-loc>Sebastopol, CA</publisher-loc>: <publisher-name>O&#x00027;Reilly Media, Inc</publisher-name>.</citation></ref>
<ref id="B74">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Sward</surname> <given-names>A.</given-names></name> <name><surname>Vecna</surname> <given-names>I.</given-names></name> <name><surname>Stonedahl</surname> <given-names>F.</given-names></name></person-group> (<year>2018</year>). <article-title>Data insertion in bitcoin&#x00027;s blockchain</article-title>. <source>Ledger</source> <volume>3</volume>, <fpage>1</fpage>&#x02013;<lpage>23</lpage>. <pub-id pub-id-type="doi">10.5195/LEDGER.2018.101</pub-id></citation></ref>
<ref id="B75">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Tolbert</surname> <given-names>C. J.</given-names></name> <name><surname>Mossberger</surname> <given-names>K.</given-names></name></person-group> (<year>2006</year>). <article-title>The effects of e-government on trust and confidence in government</article-title>. <source>Public Admin. Rev.</source> <volume>66</volume>, <fpage>354</fpage>&#x02013;<lpage>369</lpage>. <pub-id pub-id-type="doi">10.1111/j.1540-6210.2006.00594.x</pub-id></citation></ref>
<ref id="B76">
<citation citation-type="web"><person-group person-group-type="author"><collab>TRC</collab></person-group> (<year>2018</year>). <source>Truth and Reconciliation Commission of Canada</source>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://www.rcaanc-cirnac.gc.ca/eng/1450124405592/1529106060525">https://www.rcaanc-cirnac.gc.ca/eng/1450124405592/1529106060525</ext-link>.</citation></ref>
<ref id="B77">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Trubetskoy</surname> <given-names>G.</given-names></name></person-group> (<year>2017</year>). <source>Notes to Self.</source> Available online at: <ext-link ext-link-type="uri" xlink:href="https://grisha.org/blog/2017/10/20/blockchain-in-postgresql-part-2/">https://grisha.org/blog/2017/10/20/blockchain-in-postgresql-part-2/</ext-link></citation></ref>
<ref id="B78">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Tyacke</surname> <given-names>S.</given-names></name></person-group> (<year>2001</year>). <article-title>Archives in a wider world: the culture and politics of archives</article-title>. <source>Archivaria</source> <volume>52</volume>, <fpage>1</fpage>&#x02013;<lpage>25</lpage>.</citation></ref>
<ref id="B79">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Van Garderen</surname> <given-names>P.</given-names></name></person-group> (<year>2016</year>). <article-title>Decentralized Autonomous Collections</article-title>. <source>Medium On Archivy</source>.</citation></ref>
<ref id="B80">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Vigna</surname> <given-names>P.</given-names></name> <name><surname>Casey</surname> <given-names>M. J.</given-names></name></person-group> (<year>2019</year>). <source>The Truth Machine: The Blockchain and the Future of Everything</source>. <publisher-loc>London</publisher-loc>: <publisher-name>Picador</publisher-name>.</citation></ref>
<ref id="B81">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Walch</surname> <given-names>A.</given-names></name></person-group> (<year>2015</year>). <article-title>The bitcoin blockchain as financial market infrastructure: a consideration of operational risk</article-title>. <source>NYUJ Legis. Pub. Poly</source> <volume>18</volume>:<fpage>837</fpage>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2579482">https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2579482</ext-link></citation></ref>
<ref id="B82">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Walters</surname> <given-names>W.</given-names></name></person-group> (<year>2002</year>). <article-title>The power of inscription: beyond social construction and deconstruction in european integration studies</article-title>. <source>Millennium</source> <volume>31</volume>, <fpage>83</fpage>&#x02013;<lpage>108</lpage>. <pub-id pub-id-type="doi">10.1177/03058298020310010501</pub-id></citation></ref>
<ref id="B83">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Wells</surname> <given-names>H. G.</given-names></name></person-group> (<year>2005</year>). <source>A Short History of the World</source>. <publisher-loc>New York, NY</publisher-loc>: <publisher-name>Cosimo, Inc</publisher-name>.</citation></ref>
<ref id="B84">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Yeung</surname> <given-names>K.</given-names></name></person-group> (<year>2019</year>). <article-title>Regulation by blockchain: the emerging battle for supremacy between the code of law and code as law</article-title>. <source>Mod. Law Rev.</source> <volume>82</volume>, <fpage>207</fpage>&#x02013;<lpage>239</lpage>. <pub-id pub-id-type="doi">10.1111/1468-2230.12399</pub-id></citation></ref>
<ref id="B85">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Zgonjanin</surname> <given-names>S.</given-names></name></person-group> (<year>2005</year>). <article-title>The prosecution of war crimes for the destruction of libraries and archives during times of armed conflict</article-title>. <source>Libr. Cult.</source> <volume>40</volume>, <fpage>128</fpage>&#x02013;<lpage>144</lpage>. <pub-id pub-id-type="doi">10.1353/lac.2005.0041</pub-id></citation></ref>
</ref-list>
<fn-group>
<fn id="fn0001"><p><sup>1</sup><ext-link ext-link-type="uri" xlink:href="https://tse.bitnation.co/">https://tse.bitnation.co/</ext-link></p></fn>
<fn id="fn0002"><p><sup>2</sup><ext-link ext-link-type="uri" xlink:href="https://www.getmonero.org/">https://www.getmonero.org/</ext-link></p></fn>
</fn-group>
</back>
</article>