The use of Access Control Lists allows owners/controllers of files the privilege of being able to revoke access post-facto. With only owners/controllers allowed to update the ACLs, whose authority is verified via cryptographic signatures on the Arcana blockchain, this model does not suffer from the ambient authority trap[9] or the confused deputy problem[10] prevalent in centralised ACL constructions.