web3 with a16z crypto

Governance Attack!?

Episode Summary

We breakdown the recent Compound “governance attack”, including discussing whether “governance attack” is the right label for it or not; how it’s different from other attacks; and the broader trend of online vs offline governance attacks in general. We also discuss how to avoid, prevent, and respond to such governance attacks -- highlighting key differences between on-chain/ token-based/ digital voting systems vs. physical-world political systems around the world. What happens when you have activity from actors that the majority doesn’t necessarily agree with? How do you distinguish between good-faith and bad-faith activity, especially on-chain? And other such tricky questions?

Episode Notes

with @ahall_research @eddylazzarin @0xShuel  @smc90

In this episode, we cover both recent events + evergreen governance questions in political systems: Specifically, we breakdown the recent Compound “governance attack”... as well as the broader topic of DAO governance and voting in general. We also discuss how to avoid, prevent, and respond to such governance attacks -- highlighting key differences between on-chain/ token-based/ digital voting systems vs. physical-world political systems around the world. 

What happens when you have activity from actors that the majority doesn’t necessarily agree with? How do you distinguish between good-faith and bad-faith activity, especially on-chain? And other such tricky questions?? Our experts answering these questions (in conversation with Sonal Chokshi) include: 

- a16z crypto CTO Eddy Lazzarin;
- head of network operations Ross Shuel;
- and a16z crypto research collaborator, and Stanford professor of political science, Andrew Hall.

The episode begins by quickly recapping the exact sequence of a recent Compound governance “attack” event a few weeks ago -- including discussing whether “governance attack” is the right label for it or not; how it’s different from other attacks; and the broader trend of online vs offline governance attacks in general -- before then going into specific solutions. The team also shares some behind-scenes tick tock on what happened, how people figure out motives behind actions on-chain (especially given the "indistinguishability problem"), and much more. 

Pieces mentioned in this episode and other resources: