Pages:
Author

Topic: Why Bitcoin Could be Beat. (Read 5212 times)

full member
Activity: 189
Merit: 100
The future will be Digital
June 30, 2014, 12:32:04 AM
#60
I think time is the only problem when will happen or never?
newbie
Activity: 56
Merit: 0
April 12, 2014, 10:43:31 AM
#59
Yep, POS is definitely far worse than POW, and completely against the spirit of crypto.

Could you explain that?
+1
I'd like to hear that explanation too.
I think POS will kill POW oneday
hero member
Activity: 525
Merit: 500
April 03, 2014, 04:30:56 PM
#58
Yep, POS is definitely far worse than POW, and completely against the spirit of crypto.

Could you explain that?
+1
I'd like to hear that explanation too.
sr. member
Activity: 364
Merit: 250
☕ NXT-4BTE-8Y4K-CDS2-6TB82
April 03, 2014, 04:27:17 PM
#57
All that really amounts to though is that in order to trash a Proof of Stake coin they need some way of shorting, or betting against, the chain, that can handle a short or wager large enough to cover the losses their stake in the coin will suffer when they do trash the coin.

That is wrong. An attacker will never need to cover losses. He can attack just because.
sr. member
Activity: 364
Merit: 250
☕ NXT-4BTE-8Y4K-CDS2-6TB82
April 03, 2014, 04:24:20 PM
#56
Yep, POS is definitely far worse than POW, and completely against the spirit of crypto.

Could you explain that?
legendary
Activity: 1205
Merit: 1000
April 03, 2014, 02:49:07 AM
#55
A picture speaks a thousand words.
You are just showing a template of nothing.
Everybody can buy it for just $18: https://wrapbootstrap.com/theme/smartadmin-responsive-webapp-WB0573SK0

___________________________

Nxt is alive and kicking! Smiley

http://nxtra.org/nxt-client/
full member
Activity: 126
Merit: 100
April 02, 2014, 06:21:41 AM
#54
Yes, the same is used in Bitcoin, isn't it? In Nxt u do it manually, in Bitcoin this is hardcoded.

I don't know much about Bitcoin though I read the whitepaper. I only used it to buy Nxt.  Wink

Edit: Hardcoded well-known nodes lead to centralization. This is just another one of the cases where Nxt is more decentralizing than Bitcoin.
legendary
Activity: 2142
Merit: 1010
Newbie
April 02, 2014, 03:42:21 AM
#53
Seems it cannot be avoided. There is always a chance for the new guy to be cheated. He need to choose the trust-worth well known nodes.

Yes, the same is used in Bitcoin, isn't it? In Nxt u do it manually, in Bitcoin this is hardcoded.
full member
Activity: 126
Merit: 100
April 02, 2014, 03:25:16 AM
#52
Doesn't which blockchain he sees first depend on which well-known nodes he chooses? He could choose the bad guy's node.

Exactly.

Seems it cannot be avoided. There is always a chance for the new guy to be cheated. He need to choose the trust-worth well known nodes.
legendary
Activity: 2142
Merit: 1010
Newbie
April 02, 2014, 03:15:57 AM
#51
Doesn't which blockchain he sees first depend on which well-known nodes he chooses? He could choose the bad guy's node.

Exactly.
full member
Activity: 126
Merit: 100
April 02, 2014, 03:09:25 AM
#50
Then both the branches will report the other in its blockchain. The new guy is still confused.    Huh

No. The new guy will stick to the 1st blockchain he sees.

Doesn't which blockchain he sees first depend on which well-known nodes he chooses? He could choose the bad guy's node.
legendary
Activity: 2142
Merit: 1010
Newbie
April 02, 2014, 03:01:45 AM
#49
Then both the branches will report the other in its blockchain. The new guy is still confused.    Huh

No. The new guy will stick to the 1st blockchain he sees.
full member
Activity: 126
Merit: 100
April 02, 2014, 02:45:33 AM
#48
Hard to answer, Transparent Forging is not implemented yet. Without TF Ix's attacks would be successful.
Are you saying that after TF is fully implemented, the new guy can tell who is the bad guy from the blockchains? How?

If anyone sees a contradicting block mined by someone then he will "report" it by including block headers into the blockchain.

Then both the branches will report the other in its blockchain. The new guy is still confused.    Huh
legendary
Activity: 2142
Merit: 1010
Newbie
April 02, 2014, 02:31:31 AM
#47
Hard to answer, Transparent Forging is not implemented yet. Without TF Ix's attacks would be successful.
Are you saying that after TF is fully implemented, the new guy can tell who is the bad guy from the blockchains? How?

If anyone sees a contradicting block mined by someone then he will "report" it by including block headers into the blockchain.
full member
Activity: 126
Merit: 100
April 02, 2014, 02:25:17 AM
#46
Hard to answer, Transparent Forging is not implemented yet. Without TF Ix's attacks would be successful.
Are you saying that after TF is fully implemented, the new guy can tell who is the bad guy from the blockchains? How?
legendary
Activity: 2940
Merit: 1090
April 01, 2014, 01:36:45 PM
#45
Apart from not needing to help global warming by consuming vast amounts of electricity to secure the blockchain (since by merged mining you can in effect re-use that same electricity that is already being expended anyway), the main argument for Proof of Stake had been that Proof of Work miners invest in hardware that can attack or defend any chain that uses that type of hashing as its proof of work, thus have no "stake" in any particular coin that they could choose to mine, whereas Proof of Stake miners do need a stake in the specific chain they wish to attack or defend.

All that really amounts to though is that in order to trash a Proof of Stake coin they need some way of shorting, or betting against, the chain, that can handle a short or wager large enough to cover the losses their stake in the coin will suffer when they do trash the coin.

So in a sense Proof of Stake coins depend upon the unavailability of means of wagering or shorting whereas Proof of Work coins depend upon unavailability of more-profitable chains to mine combined with inability of committed mining operations to muster enough hashing power to defend the chain. (They need enough committed hashing power, in other words. Because uncommitted hashing power will run off to any more profitable activity instead of continuing to secure the chain.)

Maybe though it can also be argued that "shorting" - in the sense of borrowing something - can also be used against proof of work chains: you simply borrow something to buy hashing power with instead of borrowing the coin itself or betting against it. Though you could also bet against it once you are confident you have enough hash power for an effective attack against it.

WIth Proof of Stake though you can get two bangs for your bucks: in addition to any crashing or falling of the coin's value due to your attack, you also can dump your stake too if the chain is still processing transactions after the attack and exchanges are still exchanging the coin after the attack, which could suppress the exchange-rate even more if your stake was a significant amount compared to the depth-at-each-price curve at the exchanges.

-MarkM-
full member
Activity: 140
Merit: 100
Bored
April 01, 2014, 01:14:11 PM
#44
if a government expresses to kill and acquire the pos cyrptocurrency then they can kill it by people panic selling to the government, until the govt holds 51%

in a pos
the rich keeps getting richer... its not really a fair way to distribute and acquire new users

if you have a lot of pos shares then you have less incentive to spend vs hoard thus mining more by hoarding

these are very strong weaknesses with pos compared to pow
Yep, POS is definitely far worse than POW, and completely against the spirit of crypto.
legendary
Activity: 2142
Merit: 1010
Newbie
April 01, 2014, 01:05:36 PM
#43
I don't really think of that as "the" network being forked. A fork exists, known to a scamsite that convinced someone to download a fake nodes-list and to the person or persons who downloaded that list and ran using it. That hardly seems a case of "the" network being forked, more just a case of one or more suckers falling for a fake network. Once the real network actually hears about it, would it in fact fork, or would it tell the suckers they are wrong and correct them?

Ripple's consensus supposedly would basically tell them they are wrong, ignore them, and I guess it would be up to them whether to trust the scamsite and their fellow scammed-people or all the nodes they just heard about on the other network they just heard about, wouldn't it?

-MarkM-


Hard to answer, Transparent Forging is not implemented yet. Without TF Ix's attacks would be successful.
legendary
Activity: 2940
Merit: 1090
April 01, 2014, 12:10:58 PM
#42
The new guy may be not necessarily brand new, he may have the part of the blockchain before the bad guy forging the secret chain.

So, if the new guy has chosen the bad guy as his "well-know nodes", he will go on with the secret chain, and the network will be forked. This is true for both PoW and PoS. right?

Right.

I don't really think of that as "the" network being forked. A fork exists, known to a scamsite that convinced someone to download a fake nodes-list and to the person or persons who downloaded that list and ran using it. That hardly seems a case of "the" network being forked, more just a case of one or more suckers falling for a fake network. Once the real network actually hears about it, would it in fact fork, or would it tell the suckers they are wrong and correct them?

Ripple's consensus supposedly would basically tell them they are wrong, ignore them, and I guess it would be up to them whether to trust the scamsite and their fellow scammed-people or all the nodes they just heard about on the other network they just heard about, wouldn't it?

-MarkM-
sr. member
Activity: 420
Merit: 263
let's make a deal.
April 01, 2014, 11:36:51 AM
#41
In what way does transparent forging counteract malicious miners? And why does having multiple consensus chains lead to performance optimizations? How is consensus eventually achieved?

I don't really see how calling a bug a feature makes it a feature. In what way does transparent forging counteract malicious miners? And why does having multiple consensus chains lead to performance optimizations? (That seems quite counter-intuitive.) How is consensus eventually achieved?

seems like an almost identical question to me.  come-from-beyond is just thin skinned.
Pages:
Jump to: