Often used to describe blockchains, a system is said to be permissionless when there is no entity that can regulate who can use it and how it can be used.

Often used to describe blockchains, a system is said to be permissionless when there is no entity that can regulate who can use it and how it can be used.

What Is Permissionless?

A system is said to be permissionless when it has no so-called “gatekeepers.” In the case of blockchains, we can say that Bitcoin is permissionless since no entity can forbid anybody else from using it or limiting its use for any purpose.

Put simply, Bitcoin is permissionless because anybody can use it in any way they want as long as the protocol itself allows for it, without anybody being able to stop them.

The permissionless nature of cryptocurrency is often highlighted by Bitcoin proponents as one of its foremost features. Thanks to it being permissionless, Bitcoin and its blockchain can be used by political dissidents or other organizations blacklisted by the banking systems, such as Wikileaks or even criminals. No state can censor transactions on a permissionless blockchain.

Permissioned systems, on the other hand, have some entity which limits who and/or how the system can be used. The traditional financial system is permissioned, since banks and states limit who and for what purposes people can use banks and other financial entities.

Much like the traditional financial system, some blockchains are also permissioned in nature and cannot be used by anyone and for any reason. Usually such blockchains are used by enterprises for a single purpose and can only be used by market participants, as only whitelisted addresses can use the chain.

The term “permissionless” refers to the property of a protocol being accessible to everyone without restriction, and thus, not requiring any prior permission. 

It is broadly embedded in the decentralized spirit and open-source ethos of the crypto and blockchain community that no central party should have the option to allow or disallow anyone from using a permissionless platform. Therefore, anyone who wants to access a blockchain generally does not usually need to provide identification or other KYC requirements. 

Permissionless or public blockchains ensure that nobody is discriminated against or censored on any basis, and that everyone has equal opportunity to participate whoever or wherever they may be. 

Generally, the consensus mechanisms used in permissionless networks are proof-of-work (POW) or proof of-stake (POS). With these mechanisms, it is paramount for the system’s long-term viability that its network participants (miners and stakers) should be incentivized to be honest and act in favor of normal operation. Typical examples of permissionless networks are Bitcoin, Ethereum and Monero.
This is in contrast to permissioned networks like Facebook’s Diem or enterprise blockchains, where a central party can restrict or censor either a network’s users or certain types of activities/transactions. They also require the identification of users to be declared and entered into their records. Most permissioned networks are cryptographically secured by a few validators who are authorized to produce blocks and/or contribute to the network.