The actual equipment necessary is tremendous if it were to do this naturally. Boiling everything down to i7 processors and r9 290's . . in order to double the difficulty . . you need double the equipment. Looking at suchpool.pw . . the net hashes right now are 12g#. Taking this as normal with 306 difficulty . . then the hashes number would need to double to take it to 612 difficulty. Then double again to take it to 1224 difficulty. Then double again to take it to 2500 difficulty, again to 5k, and one last time to 10k difficulty. This ends up being 2^5.
So @ 12 g#, we'd need about 5517 R9 290's . . or about 33k i7 processors just to have it there now.
Doubling this . . 11304 290's, 66k i7's . . about $5.8 million in just GPU hardware ($21 million in processors)
Double again . . 22068 290's, 132k i7's
Double again . . 44136 290's, 264k i7's
Double yet again . . 88272 290's, 528k i7's
One last doubling . . 176544 290's, 1M i7's
Also, normalizing to Scrypt . . a 10k difficulty for this coin is a difficulty of 3872.
Last I checked no one person had pretty much the entire Litecoin network in hashing power . . so I really need to lean toward a bug or serious exploit in the difficulty retargeting algorithm.
Someone please let me know how far off I am.
That's some fancy calculatin'
So, I wonder if something in the new darksend pool coding is twaeking the KGW... Is it possible that all the extra transactions are causing a difficulty twitch? I realize difficulty is based on blocks solved, not transactions sent, but perhaps something is getting crossed up somewhere?
Or is this an attack of some sort, injecting a bunch of crap hashes to try to bounce the difficulty?
Or maybe we should revisit hrt's claims ...
I think you are referencing the Time Warp exploit with KGW. Here is the post from BitcoinEXpress:
Kimoto Gravity Well is one such improvement that solves a problem that AUR is having at the moment and that is moving at the speed of death as well purportedly protects against 51%. While KGW does protect somewhat against a 51% attack, it opens up a huge hole in the time warp exploit via the diff adjust first deployed against Geist Geld back in mid 2011 and a modded versions used last year on a few Scrypt coins and SHA coins with great success.
Long story short, KGW opens up a flank where a newly modded Time Warp Exploit can be deployed. I have sandbox tested it on AUR and it seems to do the trick in grand fashion but that is with a small amount of nethash in the sandbox. I need a live chain to test it on. So considering the vast amount of request I have received to take out this 50% premine scam, I thought it would be a good candidate to test on.
Why am I giving notice? Simply because in the past when I use alt coin chains as test subjects, people tend to lose coins. In particular, my ol' buddy Kelsey lost a ton last year in GME LOL. Block 5400 or when ever KGW kicks in will be the starting point. This will give all of you enough time to either cold store your AUR or dump them until the chain is fixed, if it can be after the test.
LOL I wonder how AUR devs feel about that
Someone asked about the exploit earlier as well, but it looks like they were passed over:
I'm reading that its vulnerable to a time-warp exploit and allows for someone to execute a 51% attack with much less than 51% of the network. The Digibyte devs successfully mitigated that exploit with a modified version of KGW and the Doge devs are implementing something similar as well. Any way that Dark can leverage those two implementations?
Is this anything that Darkcoin should be worried about?
Here is a link to the discussion of the change:
https://github.com/dogecoin/dogecoin/pull/313
Honestly, I don't have enough experience with how this is programmed right now and don't really know where to start understanding it . . and also can't find enough information about time warp exploit to fully understand it . . but I am seeing some correlation to what's happening with this coin to the pictures that are posted there. Also, I'm remembering blocks having future timestamps being posted eariler.