Nobody's gamed it yet
Proof? Evidence?
Anybody can blow any nonsense words out their arse. Cryptographers understand that until you do cryptanalysis, you don't fucking know.
Nobody's gamed it yet - while I agree it needs analysis, if you can, do it. It's easy to sit in your armchair and point out there's a possibility that there is a weakness, it's a whole different story to either look for one or get someone to. One is easy and worthless, the other is harder, yet constructive.
I am so tired of that genre of
Dunning-Kruger illogic.
If you can't fucking get a clue, then please stop forcing me to come back and repeat the same damn cryptography education for you again.
You may never know that someone is getting a disproportionate amount of coins because they cracked the PoW and didn't tell you.
What 'caution' and what 'crap' again?
...
If I didn't have something much more potentially lucrative that is keeping me fully preoccupied, I would endeavor to go attempt to crack these PoW and keep it secret to make a lot of money mining.
Maybe someone already has. And you don't know!You want to criticize Zerocash for having unvetted crypto, but you won't accept the same criticism when you generate a new hash function and someone points out that the design deviates glaringly from accepted cryptography practices and you ignore it.
It behoves you to go review the Round 1 candidates for SHA-3 and see that many were broken and they were designed by cryptographers who did some analysis on their designs. Perhaps they were not broken in a way that would impact use in PoW, but these were (later broken) designs attempted to be reasonably correct by cryptographer designers, so one wouldn't expect major snafus.
Whereas, the egregious mistakes (radical experiments) made on these two PoW hashes by non-cryptographers are quite glaring. I don't know for sure they lead to significant breakage.
And you don't know either. So STFU. Mofo.
P.S. what I did from my armchair was give up extremely valuable time that I should be applying to other work, to be kind of enough to explain the
potential vulnerabilities I see. As a starting point, for someone who has time to dig and study further. Also as warning and clue to novices who have no idea otherwise.
Edit: take it from the words of your own paid cryptographer review:
http://monero.cc/downloads/whitepaper_review.pdfIt's absolutely unconscionable to to come up with a new "Proof of Work Al-
gorithm" and then refrain from including any sort of pseudocode to describe that
algorithm. Upon which. Your entire. Coin. Is. Based. Ugh.
He fails to mention "refrain from including any sort of cryptanalysis to back up that algorithm. Upon which. Your entire. Coin. Is. Based. Ugh.".
Edit#2: also it has been alleged that the Cryptonote PoW was likely a trojan planted to mine most of the coins for the developers of Bytecoin. So it was perhaps never designed to be secure, but rather designed to maximize obfuscation of the alleged Bytecoin scam.