🇬🇧 English | 🇫🇷 Français

Crisis

Avatar mael-rolland.eth

A rhythmic history of crises to manage (2009-2018)

Cryptocurrencies crisis, from the actor's perspective

The state of crisis reveals what actors consider “normal” and what is not: recognition of a gap between the actions prescribed by the design (designers and users) and the actions actually carried out. A strict interpretation of the slogan “code is law” completely invalidates the very concepts of flaws, vulnerabilities, bugs, or even attacks: all results of code are, by definition, normal, indisputable, and legitimate. Hence the paradox: many self-proclaimed coiners from the radicalized camp use crisis terminology—talking about flaws, attacks, and the “honesty” expected of nodes (Nakamoto 2008)—adding to these codes an extra layer of soul, a normativity without which they have no meaning.

"Code is Law" when "Code is flaw" ?

If we are to take the slogan “Code is Law” seriously, in his Lessig original sense (2000): it is impossible to distinguish between code—effective and neutral because it is ‘dry’—and law—flawed and arbitrary because it is “wet” (N. Szabo 2008). If the law is conflictual because of its interpretative dimension, the same is true of “computer code and computer-readable files (insofar as: [if normally] a computer processes them in a consistent manner)” (Ibid.). In times of crisis, precisely, it processes them inconsistently. This interpretative dimension is also inherent in codes. We find the conceptual opposition between the “letter” and the “spirit of the law”: the application of a law presupposes an interpretative activity on the part of the judge, combining the letter of the law (legislative texts and the literal interpretation they allow) and its spirit, which is supposed to capture the underlying intentions of a legislative text. Similarly, Bitcoin's canonical protocol rules go beyond their syntax and semantics (the letter of the codes), encompassing the intentions of developers, community debates, and their compromises, which will result in the inclusion/exclusion of new features, the release of new versions, or even forks.

Two major families of protocol crises

Bitcoiners using / forging crisis terminology thereby mobilize a normativity presupposing a "social contract" and various devices, without which no problematic gap between the desired product of a code (its "spirit") and the result of its "letter" can be recognized. This hiatus and its recognition refer to a normalization process from which coiners draw different types of crises/modifications of canonical consensual protocol rules. Four situations appear possible, depending on whether or not the protocol software "codes" ("their letter") and the expectations that community members have of them (their "spirit") coincide, as represented in the following table.

…what is EXPECTED = considered legitimate by social consensus
…what is UNEXPECTED = considered illegitimate by social consensus
The code ALLOWS…
The code DOESN'T ALLOW…
[a] Normal situation
Action: Status quo
Ex.: double spending control, monetary creation following planned schedule, etc.
[b] "Vulnerability" crisis
Action: Bug correction to restore enforceability of past norms
Ex.: CVE 2018 case - inflation vulnerability fix
[c] "Evolution" crisis
Action: Apply new protocol rules to adapt to community expectations
Ex.: SegWit and Scaling Debate; The DAO hack
[d] Normal situation
Action: Status quo
Ex.: rejection of double spending, invalidation of unauthorized monetary creation, etc.

Bitcoin Historical Crisis

This interactive timeline presents a systematic analysis of Bitcoin protocol vulnerabilities from 2009 to 2019. Each vulnerability is catalogued using an indigenous crisis taxonomy developed through empirical research into blockchain governance mechanisms. The timeline serves as both a historical record and a methodological framework for understanding cryptocurrency crisis management patterns.

Indigenous Labels & Crisis Governance

These crisis categorizations represent an indigenous vulnerability taxonomy pointing to an existing crisis governance framework, drawn through systematic protocol crisis analysis. Each label indicates specific threat vectors requiring potentially distinct crisis management approaches.

GENESIS: Protocol launch milestone
DOS: Denial of Service attacks, disrupt network access as nodes encounter issues (crashes, difficulty processing incoming data, etc.), impairing transactional properties.
THEFT: Asset extraction vulnerabilities, one or more actors gain control of native account units outside of consensual protocol rules.
FAKE CONF: False confirmation exploits, one or more actors can perform double-spending by manipulating confirmations.
NETWORK SPLIT: Chain division vulnerabilities, network uniqueness and canonical ledger compromised as alternative networks emerge with nodes operating under different protocol rules, unable to converge.
EXPOSURE: Information disclosure risks, one or more actors can access data from users beyond the intended scope.
INFLATION: Monetary supply manipulation, one or more actors can create native account units outside of canonical protocol minting rules.
UNKNOWN: Unclassified vulnerability types, the full scope of potential abuses is not precisely known.

CRITICAL VULNERABILITIES: Vulnerabilities classified as RED SEVERITY on the Bitcoin Wiki.

CVE: Common Vulnerabilities and Exposures identifier | BIP: Bitcoin Improvement Proposal

41 Crises
/
42 Types
14 Critical vulnerabilities
11 Years covered

Distribution by Vulnerability Type

Vulnerabilities by Year

⚠️ DATA UPDATE IN PROGRESS ⚠️

Timeline currently covers 2009-2019. Additional vulnerabilities from 2019-2024 are being verified and will be added soon.

Data validation based on Bitcoin Wiki, CVE databases, and Bitcoin Core disclosures.