For the NITWITS that failed 1st grade math. (You know who you are. )
BTU holds 30% Segwit requires 95%,
Now follow me here, Absolutely NO MATTER WHAT
100-30= 70So there is no way on God's Green Earth segwit could ever attain 95% ,
(FYI: Deadwit can't even get 35%) So all together Let's make it Official
DEADWIT is Done!So that leaves Bitcoin Unlimited or a yet to be name
lower blockspeed solution. =>
https://bitcointalksearch.org/topic/m.18206691So for Pete Sake , Core / Blockstream get off your ass and fix the transactions issue by increasing blocksize or lowering blockspeed.
Either would work, or be prepared for BTU to take over development of Bitcoin.
And for any of you whinners that want to claim core makes no errors.
I give you
https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures (A list of BTC Core's Fuck Ups.)
Common Vulnerabilities and Exposures
CVE Announced Affects Severity Attack is... Flaw Net
CVE-2010-5137 2010-07-28 wxBitcoin and bitcoind DoS[1] Easy OP_LSHIFT crash 100%
CVE-2010-5141 2010-07-28 wxBitcoin and bitcoind Theft[2] Easy OP_RETURN could be used to spend any output. 100%
CVE-2010-5138 2010-07-29 wxBitcoin and bitcoind DoS[1] Easy Unlimited SigOp DoS 100%
CVE-2010-5139 2010-08-15 wxBitcoin and bitcoind Inflation[3] Easy Combined output overflow 100%
CVE-2010-5140 2010-09-29 wxBitcoin and bitcoind DoS[1] Easy Never confirming transactions 100%
CVE-2011-4447 2011-11-11 wxBitcoin and bitcoind Exposure[4] Hard Wallet non-encryption 100%
CVE-2012-1909 2012-03-07 Bitcoin protocol and all clients Netsplit[5] Very hard Transaction overwriting 99%
CVE-2012-1910 2012-03-17 bitcoind & Bitcoin-Qt for Windows Unknown[6] Hard MingW non-multithreading 100%
BIP 0016 2012-04-01 All Bitcoin clients Fake Conf[7] Miners[8] Mandatory P2SH protocol update 99%
CVE-2012-2459 2012-05-14 bitcoind and Bitcoin-Qt Netsplit[5] Easy Block hash collision (via merkle root) 99%
CVE-2012-3789 2012-06-20 bitcoind and Bitcoin-Qt DoS[1] Easy (Lack of) orphan txn resource limits 99%
CVE-2012-4682 bitcoind and Bitcoin-Qt DoS[1] 98%
CVE-2012-4683 2012-08-23 bitcoind and Bitcoin-Qt DoS[1] Easy Targeted DoS by CPU exhaustion using alerts 98%
CVE-2012-4684 2012-08-24 bitcoind and Bitcoin-Qt DoS[1] Easy Network-wide DoS using malleable signatures in alerts 98%
CVE-2013-2272 2013-01-11 bitcoind and Bitcoin-Qt Exposure[4] Easy Remote discovery of node's wallet addresses 97%
CVE-2013-2273 2013-01-30 bitcoind and Bitcoin-Qt Exposure[4] Easy Predictable change output 97%
CVE-2013-2292 2013-01-30 bitcoind and Bitcoin-Qt DoS[1] Hard A transaction that takes at least 3 minutes to verify 0%
CVE-2013-2293 2013-02-14 bitcoind and Bitcoin-Qt DoS[1] Easy Continuous hard disk seek 97%
CVE-2013-3219 2013-03-11 bitcoind and Bitcoin-Qt 0.8.0 Fake Conf[7] Miners[8] Unenforced block protocol rule 100%
CVE-2013-3220 2013-03-11 bitcoind and Bitcoin-Qt Netsplit[5] Hard Inconsistent BDB lock limit interactions 97%
BIP 0034 2013-03-25 All Bitcoin clients Fake Conf[7] Miners[8] Mandatory block protocol update 99%
BIP 0050 2013-05-15 All Bitcoin clients Netsplit[5] Implicit[9] Hard fork to remove txid limit protocol rule 97%
CVE-2013-4627 2013-06-?? bitcoind and Bitcoin-Qt DoS[1] Easy Memory exhaustion with excess tx message data 57%
CVE-2013-4165 2013-07-20 bitcoind and Bitcoin-Qt Theft[10] Local Timing leak in RPC authentication 57%
CVE-2013-5700 2013-09-04 bitcoind and Bitcoin-Qt 0.8.x DoS[1] Easy Remote p2p crash via bloom filters 61%
CVE-2014-0160 2014-04-07 Anything using OpenSSL for TLS Unknown[6] Easy Remote memory leak via payment protocol Unknown
CVE-2015-3641 2014-07-07 Bitcoind and QT prior to 0.10.2 DoS[1] Easy (Yet) Unspecified DoS
Attacker can disable some functionality, for example by crashing clients
Attacker can take coins outside known network rules
Attacker can create coins outside known network rules
Attacker can access user data outside known acceptable methods
Attacker can create multiple views of the network, enabling double-spending with over 1 confirmation
Extent of possible abuse is unknown
Attacker can double-spend with 1 confirmation
Attacking requires mining block(s)
This is a protocol "hard-fork" that old clients will reject as invalid and must therefore not be used.
Local attacker could potentially determine the RPC passphrase via a timing sidechannel.
So for all that claim BTC Core never makes mistakes, History Proves you Wrong!