So what if he/they make a decision sometime late 2016/early 2017, and it turns out to be the "wrong" one? Will they spend three years to change that as well?
If it can't offer enough people usability then other systems will and it'll die. It's a trillion miles away from being 'too big to fail'. I can see why they'd grind to a halt but it doesn't exist in a vacuum and the world is a fast moving place that don't give a shit about Bitcoin's nobility.
+1
We are being played against each other. Rough consensus attack:
http://www.metzdowd.com/pipermail/cryptography/2015-August/026151.htmlIt turns out that there is a really nice attack. If the group has a
protocol in mind, then all the attacker has to do is:
a) suggest a new alternate protocol.
b) balance the group so that there is disagreement, roughly evenly
balanced between the original and the challenger.
Suggesting an alternate is really easy - as we know there are dozens of
prototypes out there, just gotta pick one that's sufficiently different.
In this case I can think of 3 others without trying, and 6 people on
this group could design 1 in a month.
Balancing the group is just a matter of phone calls and resources. Call
in favours. So many people out there who would love to pop in and utter
an opinion. So many friends of friends, willing to strut their stuff.
Because of the rules of rough consensus, if a rough balance is
preserved, then it stops all forward movement. This is a beautiful
attack. If the original side gets disgusted and walks, the attacker can
simply come up with a new challenger. If the original team quietens
down, the challenger can quieten down too - it doesn't want to win, it
wants to preserve the conflict.
The attack can't even be called, because all contributors are doing is
uttering an opinion as they would if asked. The attack simply uses the
time-tested rules which the project is convinced are the only way to do
these things.
The only defence I can see is to drop rough consensus. By offering
rough consensus, it's almost a gilt-edged invitation to the attacker.
The attacker isn't so stupid as to not use it.
Can anyone suggest a way to get around this? I think this really puts a
marker on the map - you simply can't do a security/crypto protocol under
rough consensus in open committee, when there is an attacker out there
willing to put in the resources to stop it.
Thoughts?