An attacker is up against the entire world's CPUs (and remember I designed a very efficient CPU hash in 2014). And who is going to finance that mining farm, when mining is unprofitable?
This is the same as in any PoW chain, nothing different there.
What evil can the attacker do to recover his costs of mounting the attack? What is the incentive to do evil and how does the attacker finance the attack?
You are completely out-of-touch with the reality of the economics of mining.
Hilarious. Ok, so the attackers only motivation is to double spend. Simple as that. Why do I need to explain this to you?
Also you make the assumption that the professional mining farms in profitable PoW of Bitcoin (i.e. Satoshi's design) don't have an incentive to do evil.
They have the incentive to do GOOD as well as evil in bitcoin. By removing this angle, you have thrown away a totally critical part of the game theory.
I'll accept that you can compute a
probability of a double spend succeeding in the absence of a block reward in the face of an attacker who is arbitrarily attacking. However, you must have missed this from the 2nd paper you linked about the motivation of the attacker, which adds critical detail to the analysis:
https://bitcoil.co.il/Doublespend.pdf#page=12v=value of double spend
r=probability of double spend success
k=number of merchants attacked per block
alpha=liquidity of purchase
B=block reward
"This means that discouraging an attack requires that:"
v <= (20*(1-r)*B) / (k*(alpha + r - 1))
Set B = 0, then
v <= 0
So to discourage an attack in the absence of a block reward, the value of the double spend must be 0.
I.e. it's impossible to discourage without a block reward.I mean that without a total ordering you can't decide which double-spend to discard when those double-spends appear in separate branches of the tree.
Prepare to be surprised.
In addition, I just want to say that I am not attempting to attack you, or your idea here, I am just trying to help you succeed; it is better for a idea to receive the harshest critical analysis *before* you go to all the pains of implementing it, wherein it would be too late to fix the problems. I would like to offer suggestions in how to fix these flaws, if I can.