The phrase "not your keys, not your coins" has long encapsulated the cypherpunk ideal of self-custody of crypto-assets and protocol-level immutability of blockchains. For this reason, terms such as "sovereign" and "bearer" are used by many to describe the essential nature of crypto-assets. However, the Arbitrum intervention is arguably the latest challenge to those ideals, for better or for worse.
The seized assets were held in an externally owned account on Arbitrum—technically under the attacker’s private-key control—yet they were moved without that key. The power to do so derived not from the private keys but from Arbitrum's mutable governance structure, enforced through smart-contracts deployed on Ethereum.
The standard "playbook" so far in relation to crypto-asset recovery, certainly in the English courts but no doubt replicated elsewhere too, has been to trace misappropriated assets on-chain and to intercept them at the point at which they enter a custodial wallet controlled by a third-party, such as a crypto exchange or a custodian. However, as we previously wrote in "The endgame: issues in enforcement against cryptoassets" (2022) 8 JIBFL 545 (https://www.traverssmith.com/knowledge/knowledge-container/the-endgame-issues-in-enforcement-against-cryptoassets/ ), where victims are not so lucky and assets remain in non-custodial wallets, the hard challenge for victims of crypto fraud is enforcement and recovery without the private key.
Tulip Trading[16] (on which we acted) was probably the most ambitious case before the English courts in seeking vindication of a party's proprietary rights in crypto-assets. The claimant there sought to establish that Bitcoin Core developers owed fiduciary and/or tortious duties of care to owners of inaccessible or stolen Bitcoin, due to their (allegedly) exercising a sufficient degree of control over the network's code and protocol. As the Court of Appeal ruled (at a summary stage, ruling only on whether there was a "serious issue to be tried"), it ultimately comes down to the question of how much control someone exerts over a given protocol or code. Arguably, Bitcoin is the most "decentralised" of all blockchains, with no active founder(s) currently involved with the project. While it is technically possible to change even Bitcoin's code and/or protocol, there are practical challenges and high costs – not only financial but, perhaps more importantly, social costs – of doing so.
There is a precedent on this topic in relation to Ethereum. An exploit of a vulnerability in the code of "The DAO" (a decentralised venture capital fund on Ethereum) in June 2016 resulted in the draining of approximately 3.6 million ETH (then worth approximately US$50–60 million, or one-third of the fund’s capital). Rather than accepting the immutable "code is law" outcome, an irregular state change to re-write the blockchain history to transfer the misappropriated funds – again, without the private key – was proposed. This led to a hard-fork in which some participants accepted this proposal whilst others rejected it. It is, however, interesting to note that the fork that accepted the forced transfer is what is today still called and commonly recognised as Ethereum, while the fork favoured by the "purists" was named Ethereum Classic, which has not had the same following and adoption as the former[17].
However, if transfer without a private key at the level of a Layer-1 blockchain is too controversial, then we also had a precedent at the smart-contract level with the recovery from Oasis. Following the US$320 million Wormhole bridge hack in February 2022, an affiliate of Jump Crypto obtained an English High Court order to the effect that Oazo Apps Ltd, which was the company behind Oasis, a DeFi application, use a known vulnerability in the smart-contract code to transfer - without the private key - misappropriated assets deposited in the platform "vaults"[18]. We understand from publicly available sources that this ability to move assets without the private key was not by design. Nonetheless, the fact of that ability by Oazo meant that recovery was possible through a court order.
In the case of Arbitrum, however, it seems that the Security Council's power to, for example, transfer assets without the private key, was part of its governance design. However, users and market participants may not have known this and may now be surprised by it. Whilst centralised smart-contract applications such as stablecoins might well be expected to retain a power to mint, burn, freeze and move coins without private keys, and Oasis showed that even DeFi applications may have some such ability, Layer-2s may be seen more as "infrastructure" and closer to Layer 1 blockchains, which makes the recent Arbitrum intervention all the more surprising.