Is There a Trilemma Associated with Using Blockchain to Protect Trade Secrets?
In the quest for security, decentralization, and scalability, only two of the three requirements can be achieved simultaneously. Is the compromise on the third requirement something that a cautious company can live with?
February 05, 2019 at 07:00 AM
9 minute read
The original version of this story was published on Legal Tech News
The authors express gratitude to Steven S. Nam, Managing Editor of the Stanford Journal of Blockchain Law and Policy, for his time and support. While Bitcoin has popularized the notion of the blockchain, the underlying architecture is versatile enough to be employed in a wide range of non-cryptocurrency-related applications, such as food tracing, bills of lading in the shipping industry, and secure mobile voting. Over the past two years, there have even been a handful of commentaries expressing mixed views on how blockchain technology could be applied to protecting a company's most valuable trade secrets.
Before tackling this dilemma, we take a step back and evaluate whether and why (or why not) the blockchain may be a good fit for realizing this objective conceptually, make reference to the inherent blockchain trilemma, correlate any complementary technological merits to business needs or legal requirements, and then ambitiously set the stage for analyzing real-life implementations and the value-add.
One question to keep in mind as we go through the following, is whether the blockchain would serve to supplement or completely substitute existing storage mechanisms. After all, supplementation merely introduces an additional vault from which the same secret may be stolen.
Inherent Characteristics
One can view a blockchain as a ledger or database of information. Each new entry, or block of data, is appended to the last block along with a time stamp, and upon verification, is finalized as part of the continuing “chain” of blocks. Whether the authority to verify lies in a single entity, or a subset of entities, or is consensus-driven, is a question dependent on how centralized or decentralized the system is. The data in each block is run through a hash function, which, depending on the particular hashing algorithm, is supposed to produce a virtually unique numerical output of a predetermined number of bits—a hash value or “signature.” Anyone could use this unique output sequence later to check to see whether the stored data has been tampered with. Further, tampering is frustrated by each block's inclusion of the preceding block's hash value; so too will its own hash value be included in the subsequent block. Hence, to escape detection, a bad actor would need to modify (and re-verify) all of the blocks, not just the one.
The trilemma of the blockchain, as Ethereum founder Vitalik Buterin observed, is that in the quest for security, decentralization, and scalability, only two of the three requirements can be achieved simultaneously. Is the compromise on the third requirement something that a cautious company can live with?
For protecting trade secrets, plainly security is paramount. One would not want the company's prize formula to be corrupted, lost, or overwritten. Data integrity is crucial. One way to heighten security is to decentralize the verification process. A centralized system would not only be subject to hacking, but would present a single point of failure; in contrast, a large group of nodes are more resistant to attacks (in a proof of work system, a 51 percent attack would require one or more conspirators to amass the majority of the hashing power of the entire network) and still maintain operational status even if some nodes are down, temporarily compromised (e.g., by a denial-of-service “DoS” cyber-attack), or corrupt.
That leaves scalability. The system may operate more slowly (lengthy verifications as the nodes work towards consensus) as the number of nodes increases. But would a company that had stored its trade secret on a blockchain years in the past necessarily care about the speed at which current transactions are being processed? The verifiable transactions per second (tps) is probably a mere frill and not a deal-breaker. After some threshold number of participant nodes has been established and exceeded, after which it becomes impractical for a bad actor to seize control of the decentralized network, the company presumably would be satisfied with the scale, albeit, the more the merrier—again, to fight off the 51 percent attack.
Other Related Properties and Merits
In connection with the above, decentralized blockchains exhibit higher resilience to attack and can remain properly functioning, short of a mass concerted effort that overwhelms the network of honest nodes.
Another trait of a decentralized blockchain is its relative immutability. This is a natural consequence of having a distributed, public ledger. Integrity is so high that the Hangzhou Internet Court in China's Zhejiang province has recently allowed the introduction of electronic evidence stored in Bitcoin and Ethereum blockchains, albeit in a copyright case: Hangzhou Huatai Yimei Culture Media Co., Ltd. v. Shenzhen Daotong Technology Development Co., Ltd. In addition, still more recently, the Supreme People's Court of China recently promulgated rules allowing Internet courts to consider blockchain to verify and authenticate evidence when the parties dispute it.
Of note, permanence can be beneficial for some aspects of trade secret protection, but probably not for keeping safe third party confidential information. After the partnership or vendor-customer relationship is over, the disclosing party's information must typically be returned or deleted by the receiving party, which execution would not be practical for a distributed database.
Nonetheless, even with its high fidelity, a blockchain is still at risk of a coordinated effort to rewrite past entries on the local version of the ledger on enough nodes. The more centralized the authority or the fewer the nodes, the larger the risk.
This brings us to trust. One way to side-stepping the bottleneck of a consensus-based model as the network grows in scale is to centralize and entrust some of the decision-making in a reputable third party provider. The tradeoff to consider is whether the central authority is corrupt (or corruptible), and if not, whether it is more likely to be hacked than a decentralized system. And what guarantees are there that the third party will remain solvent over the course of a century? If Coca-Cola intends on safeguarding its recipe for another hundred years, would it be confident enough to shred all paper copies, digitize the only surviving copy, and leave that file in the hands of an up-and-coming blockchain management company?
One final facet worth raising here is visibility. Information encoded within the blocks of data are visible to any with access. On a public, permissionless blockchain, that means everyone. Transparency allows users to police and quickly detect any tampering. Displaying one's trade secret in plain sight would normally be fatal—frustrating the legal requirement of secrecy—but data may be encrypted before it is hashed and uploaded. How reliable this additional measure proves to be will depend on the initial encryption strength and, over time, the improvements in decryption methods and computational power.
Preliminary Observations, Limitations and Vulnerabilities
First, blockchain can be used to record data, but it falls short of proving ownership of a trade secret. Even with the time stamp and the decryption key, the most the company can show is that it had possession at a certain time. Possession alone is insufficient to press an offense against party B (that the information they're using is yours) or put up a defense (that you did not simply acquire the information from someone else, a party C). This is unfortunate, given that demonstrating ownership of a trade secret is a particularly thorny issue for rights-holders—i.e., how to produce enough of a paper trail to convince a judge of the existence of a secret while simultaneously trying to minimize that paper trail to stymie attempts by competitors and rogue employees to steal it—but the blockchain is not a catholicon.
Second, there is the risk of a hash collision—where two sets of data inputs result in the same output—which is not very likely, but not impossible. In many ways, hashing algorithms are like many scientific hypotheses—popularized until disproven and then discarded. SHA-1, first published in 1995, was “broken” in 2017 after a small team of researchers spent 2 years to find a method to write two different PDFs that would ultimately have the same SHA-1 hash signature.
The threat is that by sleight of hand, a competitor could produce a similar but different document to hold up in court that would cast doubt on whether plaintiff's copy was an exact copy of the time-stamped one whose hash signature was stored in the blockchain. It is estimated that another SHA-1 collision could be reproduced for as little as US$130,000, a seemingly small price to pay for legal defense that could gut a multibillion dollar misappropriation claim.
Although the industry quickly moved on to SHA-256, whose probability of collision is reportedly one in 1060, or others from the SHA-2 algorithm family, the take-away is that a motivated competitor with enough time, financial resources, and computing power—which grows more or less in line with Moore's law—could eventually crack the next embraced hash standard as well. Some have theorized that with Google's present processing power, for a particular set of data, SHA-256 may be cracked in about 52 to 60 years, but in no case more than 104 years—not a particularly comforting thought for companies who want a vehicle for safeguarding their trade secrets indefinitely.
In part 2, we will continue to explore the suitability of this technology as a solution and contrast existing legal applications and offerings. Stay tuned.
Gino Cheng is a partner in intellectual property at Winston & Strawn. As a registered U.S. patent attorney with a EE background, his practices focuses on licensing negotiations, trade secret audits, patent litigation, section 337 ITC investigations, and adversarial post-grant proceedings (IPR) at the USPTO, predominantly in the semiconductor and LED space. Gino is also a member of the firm's Disruptive Technologies Team and the cross-functional Global Privacy and Data Security Task Force. Wakako Inaba is a foreign legal advisor in Winston & Strawn's Los Angeles office and member of the Osaka Bar Association. Wakako's practice focuses on commercial litigation and international arbitration. She advises clients on commercial disputes in a wide variety of sectors including aviation, automotive, and pharmaceutical and medical device technologies.
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2025 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View All'If the Job Is Better, You Get Better': Chief District Judge Discusses Overcoming Negative Perceptions During Q&A
The Growing Antitrust Scrutiny of DraftKings and FanDuel
What Qualities Will Distinguish Good from Great Service In 2025?
Trending Stories
Who Got The Work
J. Brugh Lower of Gibbons has entered an appearance for industrial equipment supplier Devco Corporation in a pending trademark infringement lawsuit. The suit, accusing the defendant of selling knock-off Graco products, was filed Dec. 18 in New Jersey District Court by Rivkin Radler on behalf of Graco Inc. and Graco Minnesota. The case, assigned to U.S. District Judge Zahid N. Quraishi, is 3:24-cv-11294, Graco Inc. et al v. Devco Corporation.
Who Got The Work
Rebecca Maller-Stein and Kent A. Yalowitz of Arnold & Porter Kaye Scholer have entered their appearances for Hanaco Venture Capital and its executives, Lior Prosor and David Frankel, in a pending securities lawsuit. The action, filed on Dec. 24 in New York Southern District Court by Zell, Aron & Co. on behalf of Goldeneye Advisors, accuses the defendants of negligently and fraudulently managing the plaintiff's $1 million investment. The case, assigned to U.S. District Judge Vernon S. Broderick, is 1:24-cv-09918, Goldeneye Advisors, LLC v. Hanaco Venture Capital, Ltd. et al.
Who Got The Work
Attorneys from A&O Shearman has stepped in as defense counsel for Toronto-Dominion Bank and other defendants in a pending securities class action. The suit, filed Dec. 11 in New York Southern District Court by Bleichmar Fonti & Auld, accuses the defendants of concealing the bank's 'pervasive' deficiencies in regards to its compliance with the Bank Secrecy Act and the quality of its anti-money laundering controls. The case, assigned to U.S. District Judge Arun Subramanian, is 1:24-cv-09445, Gonzalez v. The Toronto-Dominion Bank et al.
Who Got The Work
Crown Castle International, a Pennsylvania company providing shared communications infrastructure, has turned to Luke D. Wolf of Gordon Rees Scully Mansukhani to fend off a pending breach-of-contract lawsuit. The court action, filed Nov. 25 in Michigan Eastern District Court by Hooper Hathaway PC on behalf of The Town Residences LLC, accuses Crown Castle of failing to transfer approximately $30,000 in utility payments from T-Mobile in breach of a roof-top lease and assignment agreement. The case, assigned to U.S. District Judge Susan K. Declercq, is 2:24-cv-13131, The Town Residences LLC v. T-Mobile US, Inc. et al.
Who Got The Work
Wilfred P. Coronato and Daniel M. Schwartz of McCarter & English have stepped in as defense counsel to Electrolux Home Products Inc. in a pending product liability lawsuit. The court action, filed Nov. 26 in New York Eastern District Court by Poulos Lopiccolo PC and Nagel Rice LLP on behalf of David Stern, alleges that the defendant's refrigerators’ drawers and shelving repeatedly break and fall apart within months after purchase. The case, assigned to U.S. District Judge Joan M. Azrack, is 2:24-cv-08204, Stern v. Electrolux Home Products, Inc.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250