📄 Perils of Current DAO Governance
2 chunks · Format: pdf
Priorities Extracted from This Source
#1
Preventing vote buying, vote selling, and coercion
#2
Protecting ballot secrecy and voter privacy
#3
Reducing plutocracy and concentration of voting power
#4
Preventing hostile takeovers and treasury-draining governance attacks
#5
Ensuring fairness and equality in voting
#6
Improving decentralization and representation in DAO governance
#7
Reducing barriers to participation such as transaction fees
#8
Balancing verifiability with privacy
#9
Developing more secure governance mechanisms and voting protocols
#10
Exploring alternatives to token-based voting, including reputation- and merit-based systems
#11
Using off-chain or hybrid governance mechanisms to reduce costs
#12
DAO governance security and resilience
#13
On-chain voting and e-voting integrity
#14
Ballot secrecy and democratic protections
#15
Decentralized data governance and data ownership
#16
Data privacy and ethics review
#17
Institutional design and legitimacy of DAOs
Document Content
Full text from all 2 processed chunks:
Chunk 0
Perils of current DAO governance
Aida Manzano Kharman1,3[0000−0002−5342−3037] and Ben
Smyth2,3[0000−0001−5889−7541]
1 Imperial College London, UK
2 University of Birmingham, UK
3 VoteTech Ltd, UK
amm3117@ic.ac.uk
io@bensmyth.com
Abstract. DAO Governance is currently broken. We survey the state
of the art and find worrying conclusions. Vote buying, vote selling and
coercion are easy. The wealthy rule, decentralisation is a myth. Hostile
take-overs are incentivised. Ballot secrecy is non-existent or short lived,
despite being a human right. Verifiablity is achieved at the expense of
privacy.Theseprivacyconcernsarehighlightedwithcasestudyanalyses
ofVocdoni’sgovernanceprotocol.Thisworkpresentstwocontributions:
firstly a review of current DAO governance protocols, and secondly, an
illustration of their vulnerabilities, showcasing the privacy and security
threats these entail.
Keywords: DecentralisedAutonomousOrganisations·Voting·Gover-
nance · Distributed Ledgers · Blockchain · Privacy · Ballot Secrecy.
1 Introduction
Welcome to Web3: The era of quick riches [39,9]. Everyone wants a slice, espe-
cially since they realised they are the pie [48,25,3]. Gone are the days where the
users provide value and the services reap the reward [49,11,41,62]. Users want a
voiceandashareofthereward[51].Asaresult,anonlinerevolutionisunfolding.
Web3’s paradigm shift is not new. For centuries collectives have organised
to redistribute centralised power and create a democracy [61,14]. They sought
control, a say in their future, lives and income. A DAO4 enables shared decision
making amongst netizens [36]. Users actively control services in which they par-
ticipate [52,10]. But do they? We uncover the truth: Wealthy minorities amass
voting power, vote buying is legal, vote selling is incentivised, coercion is easy.
We dig into the hows and the whys and illustrate these weaknesses with a case
study on Vocdoni’s governance platform.
4 Decentralised Autonomous Organisations
4202
nuJ
21
]YC.sc[
1v50680.6042:viXra
2 Manzano Kharman and Smyth.
2 DAO Governance: Fact or Fiction?
It’s 2016: DAOs are in their infancy, The DAO5 has garnered attention having
raised $150 million of Ethereum tokens. Three months after launch, The DAO
is hacked, a smart contract bug exploited, [20] $50 million siphoned off their
funds [35]. The aftermath raising questions over blockchain philosophy and the
technology’s future.
Were funds obtained legally? ‘Code is law’ is regulation enforced by tech-
nology [27]. It underpins the functioning of DAOs and blockchain. If software is
exploitable,nolawisbroken.Victimslosttheirfundsunfairly.Ethereumfounder
Vitalik Buterin proposed a soft-fork (a software update in the blockchain pro-
posal) to right the ‘wrong’. The solution was promptly abandoned; it too con-
tained a bug, making it vulnerable to further attacks.
The tokens amassed by the attacker gave them enough legislative power to
enact decisions in The DAO. The alleged attacker responded by threatening to
bribe miners to not comply with the soft-fork. They argued no smart contract
rules were broken when obtaining the funds.
TheDAO’svalueexceededthecostofacquiringenoughvotestotakecontrol,
incentivising ‘the heist.’ There is no need to break the laws established by the
DAO to succeed.
Fast-forward to 2018: History repeats, another DAO is victim to poor gov-
ernance. This time no bug was exploited, the attacker simply acquired enough
tokens, bought the vote, approved their own proposal. The coup drained nearly
$500,000 tokens from the Build Finance DAO.6 The attacker covered their
tracks using Tornado Cash, anonymising stolen funds. Token-based voting le-
galises coups—anyone can legitimately buy their way to power. Incentive makes
takeovers inevitable if the cost is cheaper than the reward.
Democracies embrace one-person one vote. Acquiring multiple votes under-
mines fairness, equality. Token-based voting is incompatible with equality and
fairness.Tokensarenotaproxyforidentity,theirownershipiseasilytransferred.
Wealth amasses tokens, buys legislative power, corrupts decision making [43]. A
voting system that allows voters to buy more votes converges to plutocracy, the
unwanted symptoms of centralisation, low representation of the electorate [8]
and game theoretic incentives to attack the DAO [13].
Sidebar1: Public Votes and Vote Selling
Game theory allows for a better understanding of vote selling. Wealthy agents
buy voting power. When it comes to voting, small to mid-sized token holder’s
votes are not as powerful. In an election, there is no incentive for them to vote
againstthewealthyagents,becausetocastavoteon-chain,votersmustalsopay
a transaction fee. Voter’s are economically incentivised to abstain [34]! Worse—
5 Confusingly, The DAO is the name of a DAO.
6 DAO Coup, Vice
Perils of current DAO governance 3
voters are economically incentivised to sell their vote for financial reward. The
latter is always a winning strategy.
A terrifyingly simple proposition: Rationale vote buyers can confirm their
purchases. Votes are typically revealed during or after an election, compliance
can be verified. Secondly, the ownership transfer of a vote is remarkably easy.
The voting ability and power is linked strictly to tokens, not to an identity.
Crypto-currencies enable fast and simple transfer of said tokens. Vote-buying
cartelscanemerge:Fromsimplesmartcontractstopayoutvotersautomatically
upon proving compliance, to cartels buying trusted hardware executing vote
buying code[7]. Particularly, the latter is an attack vector that is essentially
undetectable [22].
Theinsightsgatheredin[38]confirmtheincentivetoabstain,thedangersof
publicvotingandthecentralisationofpower.DAOgovernancewasstudiedwith
afocusonDashDAOasacasestudy.Researchersaccessedthevotinghistoryof
DashDAO’smasternodes,giventhatthesearepublic.Worryingly,IPidentifiers,
software version and wallet addresses were public too. Voting patterns of 4987
masternodes who participated in voting across 577 proposals were analysed.
Researchersfoundthat:‘Somemasternodesarenotonlyabstainingfromvoting,
buthavedisengagedfromthevotingprocesscompletely.’[38].Theyalsofounda
numberofvoterswithalmostidenticalIPPorts,stronglyindicatingthattheyare
mounting sybil attacks to gain voting power. Further to this, they analysed the
votingpatternsoftheDAOparticipants.Resultsshowthattherearesmall-sized,
denseclustersofmasternodeswithidenticalvotingpatterns.Althoughsmallerin
numbercomparedtotherestofvoters,iftheseminorityclustersweretocollude,
‘theywouldhavemorevotingpowerthantheentiredecentralisedmajority’[38].
Vote buying, public votes and paying to vote are the harsh reality of DAO
governance.Theconsequences:lowturnout,centralisation,preclusionoffreewill,
coups and coercion. A preliminary study found less than 1% of token holders
control 90% of the vote [15].7 Are DAOs decentralised when controlled by a
wealthy minority? Clearly not—the wealthy do not represent the masses.
3 My Vote: My Business
Historically, “Americans [voted] with their voices – viva voce – or with their
hands or with their feet. Yea or nay. Raise your hand. All in favor of Jones,
stand on this side of the town common; if you support Smith, line up over
there" [32]. Everyone present could verify that only voters voted and that the
count was correct. But free will must be ensured, as dictated by the United
Nations [58], the Organisation for Security & Cooperation in Europe [45], and
the Organization of American States [46]. Yet public votes forgo freedom, “The
unfortunate voter is in the power of some opulent man; the opulent man in-
forms him how he must vote. Conscience, virtue, moral obligation, religion, all
7 Chainalysis only studied ten DAOs, further study would establish general trends.
4 Manzano Kharman and Smyth.
cry to him, that he ought to consult his own judgement, and faithfully follow
its dictates. The consequences of pleasing, or offending the opulent man, stare
him in the face...the moral obligation is disregarded, a faithless, ..., pernicious
vote is given” [56]. The need for voting privately became evident. In-person vot-
ing ensures this by providing identical ballots that are completed in a private
booth, a concept first introduced successfully in Australian voting in 1856 [42].
Sidebar2: Ballot Secrecy in e-voting
In e-voting, the concept of secret ballots emerged parallel to the development of
such voting schemes, originating with David Chaum’s first proposal of an end-
to-endverifiablevotingschemein1981.Init,voter’sballotswereprivate,andall
participantscouldcheckthatthetallyingoperationwascorrectlyperformed[18].
Forgoing ballot secrecy is to regress centuries of progress, violate human
rights and returning coercion and inequality as norms. With that in mind, we
warn: DAOs are in dire straits...
4 DAO Voting: Survival of the Richest
DAO members vote remotely, online. One of the methods is on-chain voting,
wherethepublicnatureofdistributedledgersisleveraged,usingthemasashared
andverifiabledatabase.Proposalsareencodedintosmartcontractsandsubmit-
ted to the ledger as a transaction. A vote in favour or against new proposals is
cast as a transaction on the ledger. Winning proposals are automatically exe-
cuted. Votes, proposals and election outcomes are all publicly verifiable [40,31].
On-chainvotingmakeselectionsoutcomesbinding,withoutrelyingonatrusted
intermediary or a board to implement results. Guarantees of immutability are
provided by the ledger: Once the results are announced, these cannot be tam-
pered with. Mounting an attack to re-write the blocks requires practically in-
feasible computational power. On-chain governance uses distributed ledgers as
a public (or permissioned, depending on the protocol) bulletin board. Despite
its desirable properties, it has been subject to criticism [30,55]. Its detractors
argue that blockchain voting not only fails to mitigate security risks present in
e-voting, but also introduces additional risks [47]. We agree.
Worryingly,thevastmajorityofon-chain,smartcontractvotesdonotsatisfy
ballotsecrecy.Atworst,votesarerevealedascast,andatbest,thesearepublicly
decrypted after the voting period ends. Values of a token can be artificially
inflated or devalued, ‘pump and dumps’ become simple. Whales (entities or
individuals with large amounts of tokens) can manipulate the value of a token
with their behaviour. They can express intention with public votes, swaying
token values to their favour. Just before the election closes, they change their
intention, make a profit and cash out.
Perils of current DAO governance 5
Informationonhowawalletaddressvoted,when,andhowmanytokensthey
staked to that vote is available for anyone in the ledger to see. Wallet addresses
arepseudonymous,notanonymous[5],anditispossibletolinkwalletaddresses
to individuals from information such as their transaction history [12]. Tornado
Cash hides this, but has also been maliciously used to launder millions—the
U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) re-
centlysanctionedthecrypto-currencymixer8 andthedeveloperswerearrested.9
On-chain transaction fees means voters pay to vote. Fees soar unpredictably,
unfairly discriminating between voters. They can be victims of miners refusing
to cast their votes, and only the wealthiest will survive the financial hurdles.
Payingtovoteorincreasingtheweightoftheirvoteproportionaltotheirwealth
discriminates against those who cannot do so from the decision making process.
What if a coup happens? Forking the chain brings little solace: election records
can be reverted, actual events cannot, history cannot be changed; assets may
have already been cashed out.
4.1 Off-Chain Voting and Hybrid Alternatives
Alternatives exist that don’t use blockchain to cast votes. The most popular
example is Snapshot, which many DAOs use solely or in combination with on-
chain voting to enable governance. Snapshot is decentralised, using IPFS as its
main storage layer [28]. It offers the advantage of no fees to cast a vote whilst
still being decentralised thanks to their storage system. The election outcome
however, is not automatically binding. It has to be bought on-chain. Because of
this, Snapshot is often used for polling. AragonDAO, Uniswap and MakerDAO
are examples of DAOs using a hybrid governance solution [21,2,33].
5 A New Hope?
Despite the dire situation of DAO governance, we observe that a shy but steady
shift is occurring in the space. A number of projects are emerging to address
some of the aforementioned issues, although they are still in their infancy.
SnapshotispairingwithOrangeProtocoltodevelopareputationbasedvot-
ingmechanism[44].Respondingtoinequality,communitiessuchasAlgorand[4]
and Dream DAO [24] are transitioning towards a merit based voting system to
activelyencourageparticipationanddevelopmentofthenetwork,anddistribute
voting power amongst the developers, not the wealthy. Moving away from vote
purchasing governance models is necessary to avoid plutocracies and centralisa-
tion and ‘legal’ fund siphoning.
To address ballot secrecy, VoteCoin presents an on-chain voting solution of-
feringencryptedballotsduringtheelectionprocess[50].Snapshotarealsodevel-
oping a similar feature, offering ‘shielded voting’ whereby votes are private only
until the end of the election.10 Privacy in this case, is short lived. A number
8 Tornado Cash Sanctioned, CNBC
9 Torndado Cash Developers Arrested, The Hacker News
10 Snapshot shielded voting
6 Manzano Kharman and Smyth.
of issues remain: verifiability is achieved at the expense of privacy by naively
decryptingvotespublicly.Anoptionexiststoallowanauditortodecryptvotes,
but this introduces a trust assumption of honesty of the auditor. VoteCoin also
requires voters to pay to cast their ballot. A promising on-chain voting pro-
tocol is MACI [?]. In it, voters encrypt their votes and a trusted coordinator
is tasked with decrypting the ballots and returning an election outcome. This
scheme introduces a strong trust assumption: the coordinator must indeed be
trustworthy, as they have the power to decrypt individual ballots and therefore
know how each voter voted. This protocol does not satisfy formal notions of
ballot secrecy as defined in [54]. Another relevant case study is Aragon DAO’s
new governance solution: Vocdoni. They provide an on-chain voting solution
that uses two blockchains: the Ethereum blockchain for the election process cre-
ation or status update, and the Vochain blockchain (Vochain), where votes are
cast [60]. Vochain uses the Proof of Authority Tendermint blockchain, so only
trusted nodes can relay transactions. Due to the use of two blockchains, there
is a need for an oracle to relay information from the Ethereum blockchain to
Vochain, to signal new voting processes. At time of writing, the oracle nodes
are run as trusted nodes, however, Vocdoni proposes a roadmap to substitute
them with Zero-Knowledge Rollups11 to allegedly make them trustless. Accord-
ingtoVocdoni’sdocumentation:“Onesolutiontothisproblemistomakeuseof
Zero-Knowledge Rollups as a vote aggregation and mixing mechanism between
voters and the blockchain. This would make it impossible for any third party to
verifythatavoterchoseaspecificoption” [60].Thisclaimisincorrect.Asshown
in Figure 1, the node computing the Zero-Knowledge Rollup receives the vote
unencrypted, so they must be a trusted node. If this is not the case, the node
computing the Zero-Knowledge Rollup can very easily reveal how a user voted.
While the voter ID remains private, the prover computing the Zero-Knowledge
Rollupwillstillknowhowavotervoted,giventhatitisthemwhosendthevote
totheproverinthefirstplace.Eveniftheidentitythatavoterprovidesisawal-
let address, these are pseudonymous. Indeed, the only obfuscated information is
the ID of the voter within the census. Instead, the voter sends a zero-knowledge
proof12 of inclusion demonstrating that their ID belongs to the set of accepted
voters.
To understand the implications of this, we illustrate a parallel example for
the reader: On the day of voting, anyone wishing to vote must cast their vote
publicly, but what is hidden is their ID card, replaced instead by a proof that
you hold a valid ID card and thus should be allowed to vote. Nonetheless, the
votermusthandtheirpublicvotestotheadministrators,whocaneasilyseehow
they voted, and could identify them, because indeed you were the one to hand
them your vote. This implies that first, a great deal of trust must be placed
11 A Zero-Knowledge Rollup is a proof system used to compress a number of trans-
actions into a batch, with cryptographic assurance that these are correct. A more
detailed overview is presented in [6].
12 Azero-knowledgeproofisawaytoprovethatsomeoneknowsapieceofinformation
without having to reveal it [26]
Perils of current DAO governance 7
Fig.1. Vocdoni’s Zero Knowledge Rollup Proposal. Source: Vocdoni
8 Manzano Kharman and Smyth.
on the administrators to not reveal your vote to malicious agents, and second,
that no one else except the administrators will be able to observe your ballot
as you cast it. Vocdoni addresses the second assumption by mentioning that a
private transport channel would be used to send the votes to the prover. This
assumption introduces a weaker notion of security, and the fact that the votes
remain public in this channel means that this system cannot provide notions of
ballotsecrecywhereintheadversaryisassumedtohavethepowerofintercepting
ballotsduringtheircollection.Wewouldliketohighlightthatballotsecrecydoes
notequatetopublicvoteswithanonymousidentities.Furthermore,theidentities
are not anonymous in Vocdoni, they are at best pseudonymous to the Zero-
Knowledge Rollup prover, if the private transport channel is not compromised,
and even making this assumption, voters would not be equal: later voters have
more information with public votes. This is because Vocdoni does not support
encrypted ballots with anonymous voting.
We outline another vulnerability related to the ‘self-sovereign’ identity man-
agement of Vocdoni. In their protocol every user creates their own key pair [60].
What is preventing users from selling their private key? In the anonymous vot-
ing, what is being hidden is the identity of the voter, and not their vote, so
giving the voter the ability to generate their own identity would be parallel to
allowing voters to create their own ID cards at an election. Instead of selling
their vote, voters can sell their proof of census inclusion, that is directly gen-
erated from their identity. In fact, anyone can verify if this proof is invalid, so
maliciousagentsattemptingtocoercevoterscouldeasilycheckiftheyarebeing
deceived. Similar to the Dark DAO vote buying cartels outlined by [22], iden-
tity buying cartels could emerge operating in the same manner. Indeed, black
markets selling various types of identities already exist [59,19].
Vocdoni does provide the option of having encrypted votes, but the voter
identity remains known. They do not currently support both anonymous and
encrypted voting at the same time. Similar to VoteCoin and Snapshot’s pro-
posals, verifiability is once again achieved at the cost of privacy by publicly
decrypting the results. With Vocdoni’s anonymous voting, the ballots are pub-
lic, as shown in Figure 2. We again reiterate that anonymous voting with public
votes does not achieve Ballot Secrecy.
We summarise the state-of-the-art solutions in Table 1. The most used solu-
tion is on-chain smart contracts. It is a convenient option thanks to the existing
integration platforms such as Tally and Boardroom providing a user-friendly
platform to castvotes, tallythem and summarise election outcomes. No options
provide long term Ballot Secrecy. Voter’s identities are rarely kept private and
verifiability comes at the expense of privacy in most.
6 Conclusion
Since their birth in 2016, the emergence of DAOs has only but increased. This
increase does not show any signs of slowing down. According to the data pro-
vided by DeepDAO [23], where in 2018 there were 10 DAOs, by 2020 there were
Perils of current DAO governance 9
Fig.2. Vocdoni’s Anonymous Voting Schema. Source: Vocdoni
Table 1. Current DAO governance solutions.
Voting Solution Ballot SecrecyPrivate VoterNaive Verifiability Fee to cast
satisfied? ID? Vote?
Snapshot No No Yes No
Vocdoni No Sometimes Yes Yes
VoteCoin Temporarily No Yes Yes
On-chain votes No No Yes Yes
MACI No Yes No Yes
10 Manzano Kharman and Smyth.
approximately 200 [57]. The influence and assets that DAOs hold has also in-
creased. In 2021, the total Assets Under Management held by DAOs was $520.7
million. Currently it has exploded to $29.5 billion as of January 2024 [23]. Of
particular importance is the value that these DAOs hold in their treasuries,
which according to [53] had allegedly skyrocketed in 2021, from $400 million to
$16 billion. Likewise, the number of DAO participants increased by 130 times
from 13,000 to 1.6 million.
We are witnessing a paradigm shift. With this explosion, a number of DAO
projects have catastrophically crashed [37]. Hacks, scams, pump and dumps are
rife [17]. The amount of value that has irreparably been lost as a consequence
is humbling. We call for DAO practitioners to understand the risk that poor
governance models entail. These are responsible for a number of DAO crashes.
Flawed models put a target on the treasuries of vulnerable DAOs. Rationale
actors will follow incentives: if the incentive to heist exists, DAOs cannot rely
onthemoralvirtuousnessofactors.Especiallyifmanyoftheseprojectspurport
the narrative that ‘code is law’.
The instances wherein an attacker acquires sufficient voting power to siphon
treasury funds are not anecdotal13, 14, 15. Mounting these heists are enabled by
two core components, aside from poor governance models: flash loans and cryp-
tocurrency mixers. Flash loans are defined as: ‘loans written in smart contracts
that enable participants to quickly borrow funds without the need for collateral.
These loans must be repaid in full within the same transaction, or else the en-
tire transaction, including the loan itself, will be reversed.’ [16]. In the case of
the Beanstalk DAO hack, the attacker emptied the DAO treasury using a flash
loan, completing their attack in 13 seconds. They made an $80 million profit.
Subsequently,theyanonymisedthetaintedtransactionsusingTornadoCash,an
infamous cryptocurrency mixer. Funds were irreparably lost. Although as men-
tioned earlier, Tornado Cash has been sanctioned by the OFAC, this does not
bodetheendforallcrypto-currencymixers.Indeed,oneofthearchitectsofTor-
nado Cash is already working on an alternative: Privacy Pools [29]. Flash loans
are enabled by many platforms, examples include Aave [1], and will continue
to exist. The same can be said about crypto-currency mixers. Their underlying
technology is open source. To prevent heist attacks, DAOs must ensure that
their governance system is not exploitable.
Asidefromtheincentivetowardoffhostiletake-overs,goodgovernancemust
be forefront in DAO agendas for the following reasons:
1. It ensures the ‘Decentralised’ adjective in the DAOs name actually holds
true.
2. It lays the cornerstone to have a flexible, democratic and updateable organ-
isation.
13 Build DAO’s hostile governance takeover attack, Feb 2022
14 Beanstalkcryptocurrencyprojectrobbedafterhackervotestosendthemselves$182
million
15 Sanctioned Tornado Cash DAO governance heisted by hacker
Perils of current DAO governance 11
3. Itprovidesprovablesecurityproperties:withtrulyprivatevotes,votebuying
is prevented. Decisions are fair and free.
DAOs failing to provide these properties run the inevitable risk that sooner
or later, an individual will follow incentives and empty their funds. Is that the
fate DAOs are willing to accept?
Acknowledgements AidaManzanoKharmanacknowledgesandthanksIOTA
Foundation for the funding of her PhD studies.
References
1. AAVE: AAVE Documentation (2023), https://docs.aave.com/faq/
2. Adams,H.,Zinsmeister,N.,Salem,M.,Keefer,R.,Robinson,D.:Uniswapv3core.
Tech. rep., Uniswap, Tech. Rep. (2021)
3. Al-Khouri,A.M.,etal.:Dataownership:whoowns“mydata”.InternationalJournal
of Management & Information Technology 2(1), 1–8 (2012)
4. Algorand Foundation: Update on next governance voting session (2022), https:
//www.algorand.foundation/news/governance-voting-update-g3
5. Androulaki,E.,Karame,G.O.,Roeschlin,M.,Scherer,T.,Capkun,S.:Evaluating
userprivacyinbitcoin.In:Internationalconferenceonfinancialcryptographyand
data security. pp. 34–51. Springer (2013)
6. Augot, D., Bordage, S., El Housni, Y., Fedak, G., Simonet, A.: Zero-knowledge:
trust and privacy on an industrial scale (2022)
7. Austgen, J., Fábrega, A., Allen, S., Babel, K., Kelkar, M., Juels, A.: Dao
decentralization: Voting-bloc entropy, bribery, and dark daos. arXiv preprint
arXiv:2311.03530 (2023)
8. Barbereau, T., Smethurst, R., Papageorgiou, O., Sedlmeir, J., Fridgen, G.: De-
centralised Finance’s Unregulated Governance: Minority Rule in the Digital Wild
West. Available at SSRN (2022)
9. Belk, R., Humayun, M., Brouard, M.: Money, possessions, and ownership
in the Metaverse: NFTs, cryptocurrencies, Web3 and Wild Markets. Jour-
nal of Business Research 153, 198–205 (2022). https://doi.org/https://doi.org/
10.1016/j.jbusres.2022.08.031,https://www.sciencedirect.com/science/article/pii/
S0148296322007147
10. Bellavitis, C., Fisch, C., Momtaz, P.P.: The rise of decentralized autonomous or-
ganizations (DAOs): a first empirical glimpse. Available at SSRN (2022)
11. Berghel, H.: Malice domestic: The Cambridge Analytica dystopia. Computer
51(05), 84–89 (2018)
12. Biryukov, A., Pustogarov, I.: Bitcoin over Tor isn’t a good idea. In: 2015 IEEE
Symposium on Security and Privacy. pp. 122–134. IEEE (2015)
13. Buterin, V.: Notes on Blockchain Governance (2017), https://vitalik.ca/general/
2017/12/17/voting.html
14. Carlyle, T.: The French Revolution. Oxford University Press (2019)
15. Chainalysis:TheChainalysisStateofWeb3Report(2022),https://go.chainalysis.
com/rs/503-FAP-074/images/state-of-web3.pdf
16. Chainalysis: $197 Million Stolen: Euler Finance Flash Loan Attack Explained
(2023), https://www.chainalysis.com/blog/euler-finance-flash-loan-attack/
12 Manzano Kharman and Smyth.
17. Chainalysis: The 2023 Crypto Crime Report (2023)
18. Chaum, D.L.: Untraceable electronic mail, return addresses, and digital
pseudonyms. Communications of the ACM 24(2), 84–90 (1981)
19. Collins, K.: Here’s what your stolen identity goes for on the
internet’s black market. Quartz (2015), https://qz.com/460482/
heres-what-your-stolen-identity-goes-for-on-the-internets-black-market/
20. Cryptopedia: What Was The DAO? Gemini (2021), https://www.gemini.com/
cryptopedia/the-dao-hack-makerdao
21. Cuende, L., Izquierdo, J.: Aragon Network A Decentralized Infrastructure for
Value Exchange (2017), https://cryptorating.eu/whitepapers/Aragon/Aragon%
20Whitepaper.pdf
22. Daian,P.,Kell,T.,Miers,I.,Juels,A.:On-chainvotebuyingandtheriseofDark
DAOs. Hacking, Distributed (2018)
23. DeepDAO: DAO Organizations (2023), https://deepdao.io/organizations
24. DreamDAO: The Dream DAO Merit System (2022), https://cucrew.notion.site/
Civics-Unplugged-s-Dream-DAO-A-Deeper-Dive-5142d24477064342b71267242f15749b?
p=d0625913c50d442b83c182ded4c94e24&pm=s
25. Gilder, G.: Life after Google: The fall of big data and the rise of the blockchain
economy. Simon and Schuster (2018)
26. Goldreich, O., Oren, Y.: Definitions and properties of zero-knowledge proof sys-
tems. Journal of Cryptology 7(1), 1–32 (1994)
27. Hassan, S., De Filippi, P.: The expansion of algorithmic governance: from code
is law to law is code. Field Actions Science Reports. The journal of field actions
(Special Issue 17), 88–90 (2017)
28. IPFS: Snapshot IPFS Documentation (2022), https://docs.ipfs.tech/concepts/
case-study-snapshot/#the-story
29. Khalili, J.: $197 Million Stolen: Euler Finance Flash Loan
Attack Explained (2023), https://www.wired.co.uk/article/
new-crypto-mixer-tornado-cash-without-the-crime
30. Kshetri, N., Voas, J.: Blockchain-Enabled E-voting. IEEE Software 35(4), 95–99
(2018). https://doi.org/10.1109/MS.2018.2801546
31. Lee,K.,James,J.I.,Ejeta,T.G.,Kim,H.J.:Electronicvotingserviceusingblock-
chain. Journal of Digital Forensics, Security and Law 11(2), 8 (2016)
32. Lepore, J.: Rock, Paper, Scissors: How we used to vote. The New Yorker (2008)
33. MakerTeam:TheMakerProtocol:MakerDAO’sMulti-CollateralDai(MCD)Sys-
tem (2017), https://makerdao.com/en/whitepaper
34. Mark, D., Zamfir, V., Sirer, E.G.: A Call for a Temporary Moratorium on the
DAO. Hacking, Distributed (2016)
35. Mehar, M.I., Shier, C.L., Giambattista, A., Gong, E., Fletcher, G., Sanayhie, R.,
Kim,H.M.,Laskowski,M.:Understandingarevolutionaryandflawedgrandexper-
imentinblockchain:theDAOattack.JournalofCasesonInformationTechnology
(JCIT) 21(1), 19–32 (2019)
36. Merkle, R.: DAOs, democracy and governance. Cryonics Magazine 37(4), 28–40
(2016)
37. Morrison, R., Mazey, N.C., Wingreen, S.C.: The dao controversy: the case for a
new species of corporate governance? Frontiers in Blockchain 3, 25 (2020)
38. Mosley, L., Pham, H., Guo, X., Bansal, Y., Hare, E., Antony, N.: Towards a sys-
tematic understanding of blockchain governance in proposal voting: A Dash case
study. Blockchain: Research and Applications p. 100085 (2022)
39. Murray,J.A.:Sellyourcardstowho:Non-fungibletokensanddigitaltradingcard
games. AoIR Selected Papers of Internet Research (2021)
Chunk 1
Perils of current DAO governance 13
40. Muth, R., Tschorsch, F.: Empirical analysis of on-chain voting with smart con-
tracts.In:InternationalConferenceonFinancialCryptographyandDataSecurity.
pp. 397–412. Springer (2021)
41. Nabben, K.: Decentralised Autonomous Organisations (DAOs) as Data Trusts:
A general-purpose data governance framework for decentralised data ownership,
storage, and utilisation. Available at SSRN (2021)
42. Newman, T.: Tasmania and the secret ballot. Australian Journal of Politics &
History 49(1), 93–101 (2003)
43. Ongweso, E.J.: Democratic DAO Suffers Coup, New Leader Steals
Everything. Vice (2022), https://www.vice.com/en/article/xgd5wq/
democratic-dao-suffers-coup-new-leader-steals-everything
44. Orange: Orange Protocol Documentation (2022), https://docs.orangeprotocol.io/
overview
45. Organization for Security and Cooperation in Europe: Document of the Copen-
hagen Meeting of the Conference on the Human Dimension of the CSCE (1990),
https://www.osce.org/files/f/documents/9/c/14304.pdf
46. OrganizationofAmericanStates:Americanconventiononhumanrights,"Pactof
San Jose", Costa Rica (1969), https://www.refworld.org/docid/3ae6b36510.html
47. Park, S., Specter, M., Narula, N., Rivest, R.L.: Going from bad to worse: from
internetvotingtoblockchainvoting.JournalofCybersecurity7(1),tyaa025(2021)
48. Potts,J.,Rennie,E.:Web3andthecreativeindustries:Howblockchainsarereshap-
ing business models. In: A Research Agenda for Creative Industries, pp. 93–111.
Edward Elgar Publishing (2019)
49. Schneble, C.O., Elger, B.S., Shaw, D.M.: Google’s Project Nightingale highlights
the necessity of data science ethics review. EMBO molecular medicine 12(3),
e12053 (2020)
50. Scholtz, L.: VoteCoin (2022), https://www.vote-coin.com
51. Serada, A., Grym, J., Sihvonen, T.: The Economy of Attention on Blockchain in
the Brave Browser. In: Futures of Journalism, pp. 49–62. Springer (2022)
52. Sims, A.: Blockchain and decentralised autonomous organisations (DAOs): the
evolution of companies? (2019)
53. Slavin, A., Werbach, K.: Decentralized autonomous organizations: Beyond the
hype. In: World Eco-nomic Forum (2022)
54. Smyth,B.:Ballotsecrecy:Securitydefinition,sufficientconditions,andanalysisof
Helios. Journal of Computer Security (Preprint), 1–61 (2021)
55. Taş, R., Tanrıöver, Ö.Ö.: A systematic review of challenges and opportunities of
blockchain for E-voting. Symmetry 12(8), 1328 (2020)
56. Thompson, T.P.: An abridgement of the article on the ballot which appeared in
theWestminsterReview,No.XXV,forJuly,1830,earnestlyrecommendedtothe
serious consideration of every elector in the United Kingdom. At the office of the
National Political Union (1832), https://jstor.org/stable/60209037
57. Toppin, J.: DAOs Aren’t A Fad — They’re A Platform (2022), https://www.
forbes.com/sites/jeffkauflin/2022/02/03/daos-arent-a-fad-theyre-a-platform/
58. UNGeneralAssembly:Universaldeclarationofhumanrights.UNGeneralAssem-
bly 302(2), 14–25 (1948)
59. US Department of Justice: SSNDOB Marketplace, A Series
Of Websites That Listed More Than 20 Million Social Se-
curity Numbers For Sale, Seized And Dismantled In Interna-
tional Operation (2022), https://www.justice.gov/usao-mdfl/pr/
ssndob-marketplace-series-websites-listed-more-20-million-social-security-numbers-sale
14 Manzano Kharman and Smyth.
60. Vocdoni: Vocdoni Documentation (2021), https://docs.vocdoni.io/architecture/
general.html
61. Wade, R.A.: The Russian Revolution, 1917, vol. 53. Cambridge University Press
(2017)
62. Wilhelm, A.: Datacy raises $2.4m to help consumers monetize their
own damn data. Tech Crunch (2021), https://techcrunch.com/2021/05/26/
datacy-raises-2-4m-to-help-consumers-monetize-their-own-damn-data/