Third Parties (and Why Bitcoin Removes Them)
Tags: trust, intermediaries, security holes, censorship
What the sources mean by “third parties”
In the “trusted third parties are security holes” framing (Nick Szabo), a trusted third party (TTP) is not “a helpful service” — it is a security vulnerability: a place where a protocol quietly assumes a third party will behave correctly, stay available, resist coercion, and not abuse power.
Szabo’s suggested language swap is blunt and useful: “trusted” often really means “vulnerable to.”
Source: raw/Theory/protocol/trusted-third-parties.md
Why intermediaries exist in legacy money
Inventing Bitcoin models banks and payment processors as centralized ledgers (databases) that:
- Authenticate users (accounts, passwords, KYC)
- Enforce ordering (preventing double spending)
- Reverse or refuse transactions
This works — but it concentrates control and creates a single point that can be coerced, hacked, censored, or used for rent extraction.
Source: raw/Books/izobretaem-bitkoin/glava-2.md
How Bitcoin removes the need to trust them
Bitcoin replaces “a ledger you can access only through the bank” with:
- A shared, replicated ledger (blockchain)
- Local verification by independent participants (governance and running-a-node)
- Ordering secured by Proof of Work
The point is not “no one provides services.” It is that the base layer does not require trusting a specific institution to define balances, settle finality, or allow participation.
See also the network-wide coordination and incentive framing in “Bitcoin is an idea”: Bitcoin as an unstoppable protocol-level idea that persists beyond any single organization.
Source: raw/Books/21-sposob/glava-1-bitcoin-eto-ideya.md
What Bitcoin does not eliminate
The sources imply a crucial distinction:
- Protocol-level trust minimization: anyone can validate; no privileged ledger operator is required.
- Service-level convenience: exchanges, hosted wallets, explorers, and custodians can exist — but they reintroduce third-party risk.
This is why self-custody and running your own node are framed as sovereignty tools: they reduce reliance on external TTPs.
Sources
- Trusted Third Parties Are Security Holes
- Inventing Bitcoin — Ch. 2 (removing the intermediary)
- 21 Ways — Ch. 1: Bitcoin is an idea
Related Terms
Glossary | Bitcoin | double spend | governance | decentralization | censorship resistance | security | privacy
Related Pages
- double-spend — why legacy systems rely on ledger keepers
- governance — nodes enforce rules; no one can force upgrades
- bitcoin-node — why local validation matters
- bitcoin-core — Core as the dominant implementation (not a ruler)
- running-a-node — practical “don’t trust, verify”