TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Can a Proof-of-Work chain use its computing toward real needs?

14 pointsby nuclearsugaralmost 3 years ago
Is there a proof-of-work chain where all of the computing isn&#x27;t just wasted on itself and instead contributes to something like protein folding science? Or allows businesses to rent it as a renderfarm? I imagine the security of that wrapper is impossible, yeah?<p>I thought that was part of the allure of Ethereum smart contracts... But is my understanding incorrect?

9 comments

nextaccounticalmost 3 years ago
The trouble is that the reason PoW protects the network is that the mined block is an input to the PoW function. This means that if an attacker wants to change the network it needs to spend the same amount of processing power mining another block (and as the blocks are generated, it&#x27;s gets harder and harder to catch up)<p>Can you think about a real world problem that also has the freshly mined block as an input?<p>Perhaps we can have a randomized problem like a monte carlo algorithm of protein folding where the random seed is set by the hash of the mined block. Or something.
elcritchalmost 3 years ago
I’ve thought about this on occasion. It seems that allowing arbitrary work units (eg user defined ones) breaks the POW model as it’d not use a predictable amount of compute. Miners or others could readily game the system.<p>Maybe it’d be possible to make the compute time unpredictable (or more predictable) using homomorphic encryption or similar techniques. Then a computation would operate over all the possible inputs. That’d be interesting, but would limit the types of problems.<p>Alternatively, perhaps something like QM simulations over pre-specified inputs (with a salting function based on the current block hash) might do POW and be useable. The inputs could be just defined over an increasing number of atoms in set pattern. Though finding problems sets in QM that are also NP complete might limit the usefulness. Many interesting QM calculations aren’t NP and don’t have any polynomial way to check answers.
throwaway22032almost 3 years ago
If the work is significantly useful outside of the protocol then the protocol is insecure because the actors care less about the protocol than the externality.
评论 #32537858 未加载
logicalmonsteralmost 3 years ago
Never say never, but I think it&#x27;s probably impossible to solve specific business problems and still have some hypothetical PoW crypto be decentralized, trustless, secure, etc.<p>Is that necessarily a problem? To me, it isn&#x27;t.<p>IMO, everything here comes down to a question of competing values.<p>&gt; If you generally trust the government and our institutions to manage money, you&#x27;ll probably view PoW crypto as unacceptably polluting almost no matter what.<p>&gt; If you generally distrust the government and the ruin they can do to the currency, there&#x27;s almost no amount of pollution you won&#x27;t accept to save yourself from the misery of hyperinflation and the horrors that can come from that.<p>There&#x27;s no reconciling these two worldviews.
rexstjohnalmost 3 years ago
The model that makes sense to me is what DYDX is doing with their decentralized platform.<p>They use the blockchain to settle and track finalized transactions and offload computations to the validator nodes (which are effectively servers dedicated towards supporting the security of the chain).<p>Regardless of how it is implemented, I don’t see the computations happening on chain. It makes the most sense to use the blockchain to buy and sell an open network of machines.<p>Akash Network are doing similar. OTOY RenderCoin are another. Flux are doing “proof of useful work” aka “the work does something valuable other than solving crypto puzzles.”<p>I think about this a lot because I was at NVIDIA : Intel : Arm looking at ecosystem and how web3 would impact silicon markets.<p>I have a podcast about this here: <a href="https:&#x2F;&#x2F;www.linkedin.com&#x2F;feed&#x2F;update&#x2F;urn:li:share:6932815281505390592?utm_source=linkedin_share&amp;utm_medium=member_ios_link_share&amp;utm_content=post" rel="nofollow">https:&#x2F;&#x2F;www.linkedin.com&#x2F;feed&#x2F;update&#x2F;urn:li:share:6932815281...</a><p>And an article here: <a href="https:&#x2F;&#x2F;www.linkedin.com&#x2F;pulse&#x2F;machine-economy-coming-rex-st-john" rel="nofollow">https:&#x2F;&#x2F;www.linkedin.com&#x2F;pulse&#x2F;machine-economy-coming-rex-st...</a><p>And a sub stack about it here: <a href="https:&#x2F;&#x2F;rexstjohn.substack.com&#x2F;p&#x2F;signal-versus-noise" rel="nofollow">https:&#x2F;&#x2F;rexstjohn.substack.com&#x2F;p&#x2F;signal-versus-noise</a><p>And I track all these so-called “MachineFi” projects here: <a href="https:&#x2F;&#x2F;twitter.com&#x2F;rexstjohn&#x2F;status&#x2F;1536565016320540673?s=21&amp;t=rRZVvPOuH42iVoQWgu1FcQ" rel="nofollow">https:&#x2F;&#x2F;twitter.com&#x2F;rexstjohn&#x2F;status&#x2F;1536565016320540673?s=2...</a>
1egg0myegg0almost 3 years ago
Short answer, no. Long answer, also no. Blockchain is inherently an inefficient way to compute. You should just trust a centralized authority and get waaaaay more utility for your compute. Your centralized authority could be the very cause or organization that you are computing for. If you trust them enough to run a random algorithm for them, you don&#x27;t need a blockchain. You need to trust them as a central authority.
decodebytesalmost 3 years ago
A public good project I work on (sigstore) penned an article on why a suitable application found it a challenge to leverage Blockchain <a href="https:&#x2F;&#x2F;blog.sigstore.dev&#x2F;sigstore-blockchain-vs-transparency-logs-d673ea41a9be" rel="nofollow">https:&#x2F;&#x2F;blog.sigstore.dev&#x2F;sigstore-blockchain-vs-transparenc...</a>
primaxalmost 3 years ago
My mining rig is an effective space heater.
评论 #32546403 未加载
rvzalmost 3 years ago
So you mean <i>useful</i> Proof of Work? If so, then yes, and that is Handshake. [0] A <i>decentralized</i> blockchain based naming and certificate authority.<p>So far, that is the ONLY exceptional case and example of using proof-of-work that is useful and what I am willing to accept that makes sense to prevent a repeat of this [1] or this [2] or more TLD takeovers and DNS hijacking attempts like [3] and [4].<p>[0] <a href="https:&#x2F;&#x2F;handshake.org" rel="nofollow">https:&#x2F;&#x2F;handshake.org</a><p>[1] <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=21611677" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=21611677</a><p>[2] <a href="https:&#x2F;&#x2F;thehackerblog.com&#x2F;the-io-error-taking-control-of-all-io-domains-with-a-targeted-registration&#x2F;" rel="nofollow">https:&#x2F;&#x2F;thehackerblog.com&#x2F;the-io-error-taking-control-of-all...</a><p>[3] <a href="https:&#x2F;&#x2F;cointelegraph.com&#x2F;news&#x2F;curve-finance-exploit-experts-dissect-what-went-wrong" rel="nofollow">https:&#x2F;&#x2F;cointelegraph.com&#x2F;news&#x2F;curve-finance-exploit-experts...</a><p>[4] <a href="https:&#x2F;&#x2F;cryptopotato.com&#x2F;dns-hijack-compromised-ankrs-services-for-polygon-and-fantom" rel="nofollow">https:&#x2F;&#x2F;cryptopotato.com&#x2F;dns-hijack-compromised-ankrs-servic...</a>