My, my, Mr Bear. Something must have rankled.
So, anyway, you may be an audio engineer (hereby stated upon information and belief). In that case, you should easily understand this analogy: Your knowledge of Bitcoin security and of Segwit is on the same level as the audio knowledge of people who believe that in PCM digital audio, the number of samples per second determines the sizes of the tiny little stair-steps in the output waveform.
You may not need a lecture about Nyquist, but you certainly have much to learn about Bitcoin.
For others reading this thread, PSA: There are no tiny little stair-steps. In accord with the Nyquist Theorem, the discrete samples mathematically reproduce a perfectly smooth waveform. And no, a miner “ANYONECANSPEND” attack on Segwit could not steal coins. This is basic stuff...
Yes, indeed. To help you understand why, let me fix this for you:
My claim is only and exactly that in accord with Bitcoin’s security model, the violation of Segwit rules is the same as the violation of any other consensus rules.
For miners to “revert” Segwit would be no different in practice than for malicious miners to activate new rules implementing demurrage that eats up your coins in cold storage, or creating 21 trillion new bitcoins, or letting them spend any coin they want without checking signatures.
Which they are “literally unable to do”.
Because the code for nodes to accept such things does not exist. Code to “revert to a pre-Segwit protocol” literally does not exist in Core. If it did, that would be a hell of a CVE.
Why is this so hard for some people to understand? Is it a matter of confusion over “ANYONECANSPEND”? That is only a cute trick to add new rules without confusing non-upgraded nodes. It is otherwise irrelevant. Segwit nodes do not have a codepath that lets miners make them switch off Segwit validation logic and treat Segwit transactions as spendable by anyone. Segwit nodes will neither accept nor propagate blocks that violate the totality of their hardcoded consensus rules—a set of rules which, following the August 2017 activation, includes all Segwit rules (thus both permitting and enforcing Segwit transactions). So, good luck carrying off an “attack” with blocks that will be ignored as if completely nonexistent by every node that has upgraded since October 2016, i.e. pretty much everybody. It’s the dumbest attack idea that I have ever heard of.
A colluding malicious majority of hashpower could indeed wreck Bitcoin. Or BCH. Or BSV. Or any other coin based on any similar design.
To do so, violating consensus rules is neither necessary, nor sufficient, nor profitable: They could instead just rewrite blockchain history with a plain-old 51% attack that will fool validating nodes (but can only achieve double-spends).
N.b. that a 51% attack is by its nature an attack on “any competing chain” (i.e., the other 49%’s chain). Again: This does not even require violating consensus rules; and non-mining nodes are totally powerless against it!
For that reason, a malicious majority of hashpower is a threat explicitly beyond the scope of Bitcoin’s security model. That is n00b-level knowledge. Is it news to you?
But even a malicious majority of miners cannot steal coins that they never owned—Segwit or otherwise.
You can’t have your cake and eat it, too. The rules for spending coins sent to an address starting with a “1” are enforced by exactly the same security model as protects coins sent to addresses starting with “bc1”. Whereas you are trying artifically to construct some notion of a hashpower majority attack which can violate some consensus rules, whilst remaining bound by others. You don’t know how to ask the right question, viz.: What stops miners from just spending any coins they want? Answer: Consensus rules. Enforced by validating nodes. Just as Satoshi said in the Bitcoin whitepaper. That was his vision.
I have said before, and I will say again:
More than half of this post was cut on preview, to avoid waste. The rest can be summed up as (a) jbreher continues to do his usual Faketoshi apologia whilst denying it, (b) he lacks reading comprehension skills, and (c) he is correct on one point: I have no experience whatsoever with popular music. I do not produce it. I do not even listen to it! Not all music is pop.