I don't think it's an ad hoc design, it's just taking an existing p2p topology and classifying a section of the nodes to be able to preform higher functions / form internally their own mesh and then incentivize them and a quorum system for tie it together, and then building various applications/services on top of that. Most P2P networks have multi-tiers, e.g. Skype promotes end-nodes to super-nodes to route more traffic if you have a good connection... in P2P network design, Bitcoin is notable for *not* having multi-tiers. That's why I say it's a missing feature from Bitcoin which just has a single tier of fullnodes essentially, maybe Satoshi would have implemented it too if he was still around, it's not rocket science.
Except P2P networks are not Byzantine fault tolerant against Sybil attacks.
Skycoin's white paper proves that only need 0.9% of the top-tier nodes to take over a reputation linked network.
And wikipedia also documents that virtual synchrony is not Byzantine fault tolerant.
If you are just doing a vote (quorum), then isn't essentially
proof-of-stake which can be gamed unless the entropy is unbounded.
Again if I had an incentive I could try to follow all that and explain why it is unsound. But I don't have an incentive. So you all can proceed with adhoc design if that is what you want to believe will win. I believe those with higher scholarly knowledge will win. We understand what Byzantine fault tolerance means.
Again I am not saying you are wrong, because I haven't studied Dash lately and I don't have time to. It is giant obfuscation for me to try to dig into. Does even have a stable white paper that justifies the Byzantine fault tolerance?
Smooth gets it...
... and do, make subtle changes to their systems when presented with flaws, or order to "fix" the flaws. In formal and security analysis, any change, however subtle, means the analysis needs to be completely redone. Obviously you can see how this might make it infeasible to keep up with every new variation and show how each and every one of them are broken in specific detail.
Nevertheless it is possible to analyze these systems in broad terms and reach conclusions in terms of general principles, such as needing to consume some external resource (i.e. proof of "work", broadly) in order to reach a decentralized consensusmaintain unbounded entropy...