Server Side
TDNSYS infrastructure is deployed using existing, reliable and proven state of the art technologies in the Financial market infrastructures (FMIs). Operating systems, database and development tools and methodologies used in the system implementation have been in use for a long time in the IT world and they have been upgraded and hardened continuously to address new technical challenges and new security threats.
The security standards ruling the development, deployment and operation of TDNSYS are established by the government agencies that on daily basis assess new threats and threats mitigation All government legislation regarding security and privacy have to be respected as the system is owned by the Central Bank. TDNSYS Server site is as secure as any other system operated by the Central Bank.
If is impossible to counterfeit TDNs. It is impossible to access the TDNSYS database directly and the TDNSYS is balanced against the reserve accounts of member banks. Every time a TDN is issued or redeemed the reserve accounts are debited or credited as appropriate.
Resources:
NIST: National Institute of Standards and Technology
GSACybersecurity Programs & Policy
Federal Chief Information Officers (CIOs)
Federal Reserve Policy on Payment System Risk
Reading any of the documents listed above is very boring. It is not interesting as a Youtube video about Bitcoin might be making you feel smart because you understand how blockchain works. Unfortunately serious financial business is most of the time very boring.
TDNSYS does not record information about private holders of TDNs. The bank and merchants may
be required to sign the TDNs with a Central Bank issued digital certificate because
in this situation the security is more important than privacy. Private holders of TDNs
may setup PKI
instead of
TDNSYS may record information available when a transaction is executed. Most of the time this is the information about the Internet traffic related to the transaction.
Client Side
TDNSYS Server interacts with its clients over the Internet. Financial institutions may connect to the Central Bank through existing private networks. All the security issues associated with the Internet apply to TDNSYS clients. Clients deployed by banks comply with financial industry mature security standards and are less exposed to penetration and fraud.
TDNSYS exposes a public API. Third parties can develop applications for TDN transfers or payments using this API. This may create the possibility fraudulent applications. The Central Bank may decide to certify applications and allow transaction only for applications signed with a Central Bank issued digital certificate.
TDN holders must always be confident they are dealing with a trusted party. This is similar to sending money using Western Union or any other money transfer company. The money goes to party specified by the sender.
When using TDNs for making payments most of the security issues applying to cash payments have to be addressed. If you pay somebody with cash you may never have a chance to see that seller again. This is why it is very important make payment and transfer money only when you are confident that you know exactly who the other party is.
The parties involved in a TDN transaction have to assure that the TDN is valid and the double spending is prevented. This means that when transferring a TDN the party receiving it has to make sure it is valid and to request the ownership from TDNSYS immediately. The transactions should be considered completed only after the TDN was validated the ownership transferred.
Because the parties involved in a TDN transactions are responsible for validation and double
spending prevention there is flexibility in the way TDNs are used. When the parties involved
in a transaction trust each other or when the amount transferred is small the validation and
double spending prevention can be performed later or not at all. The parties might exchange
the printed TDN
During handling of a TDN as printed
Because TDNSYS clients are handling TDNs using computing devices and the Internet all the related security issues have to be addressed and all the precautions be taken.