TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

The Subjectivity / Exploitability Tradeoff

25 pointsby jrbedardover 10 years ago

2 comments

lappaover 10 years ago
Vitaliks games aren&#x27;t amusing. A blockchain has fundamental limitations that prevent PoS from working, namely it must be costly to make a fork[1]. Complexity is the enemy of security.<p>Bitcoin solved the consensus problem with it&#x27;s relatively simple incentive scheme. This post starts off by proposing a flawed system, making slight changes to the flawed system (punish attackers, trust someone when downloading the chain, assume economic incentives will cause people to update their software after an attack, etc) and recursively point out ways to &quot;fix&quot; those problems while at the same time either introducing more subproblems or more centralization.<p>This is similar to what is being done with Ethereum. Instead of one clear problem, there are many small unclear problems caused by trying to fix problems caused by a fix of a fix of a fix of the fundamental problem.<p>In short, this is Vitaliks Fractal.<p>[1] <a href="https://download.wpsoftware.net/bitcoin/pos.pdf" rel="nofollow">https:&#x2F;&#x2F;download.wpsoftware.net&#x2F;bitcoin&#x2F;pos.pdf</a>
评论 #9051772 未加载
kanzureover 10 years ago
&gt; The key argument is this: proof of work, at the core, can be seen in two different ways<p>Neither of those ways are how anyone describes proof of work. I can offer two explanations. First is the explanation of the Byzantine Generals&#x27; Problem from bitcoin.org:<p><a href="http://web.archive.org/web/20090309175840/http://www.bitcoin.org/byzantine.html" rel="nofollow">http:&#x2F;&#x2F;web.archive.org&#x2F;web&#x2F;20090309175840&#x2F;http:&#x2F;&#x2F;www.bitcoin...</a><p><i>A number of Byzantine Generals each have a computer and want to attack the King&#x27;s wi-fi by brute forcing the password, which they&#x27;ve learned is a certain number of characters in length. Once they stimulate the network to generate a packet, they must crack the password within a limited time to break in and erase the logs, lest they be discovered. They only have enough CPU power to crack it fast enough if a majority of them attack at the same time.</i><p><i>They don&#x27;t particularly care when the attack will be, just that they agree. It has been decided that anyone who feels like it will announce an attack time, which we&#x27;ll call the &quot;plan&quot;, and whatever plan is heard first will be the official plan. The problem is that the network is not instantaneous, and if two generals announce different plans at close to the same time, some may hear one first and others hear the other first.</i><p><i>They use a proof-of-work chain to solve the problem. Once each general receives whatever plan he hears first, he sets his computer to solve a difficult hash-based proof-of-work problem that includes the plan in its hash. The proof-of-work is difficult enough that with all of them working at once, it&#x27;s expected to take 10 minutes before one of them finds a solution and broadcasts it to the network. Once received, everyone adjusts the hash in their proof-of-work computation to include the first solution, so that when they find the next proof-of-work, it chains after the first one. If anyone was working on a different plan, they switch to this one, because its proof-of-work chain is now longer.</i><p><i>After about two hours, the plan should be hashed by a chain of 12 proofs-of-work. Every general, just by verifying the difficulty of the proof-of-work chain, can estimate how much parallel CPU power per hour was expended on it and see that it must have required the majority of the computers to produce in the allotted time. At the least, most of them had to have seen the plan, since the proof-of-work is proof that they worked on it. If the CPU power exhibited by the proof-of-work is sufficient to crack the password, they can safely attack at the agreed time.</i><p>Second is a more general understanding:<p><i>Proof-of-Work (PoW) works because of the economic restriction provided by the second law of thermodynamics. Even though you can&#x27;t know you&#x27;re in the consensus set, you can put a raw economic cost on the probability of you being tricked. Bitcoin uses proof-of-work to tie Bitcoin consensus to a fundamentally scarce resource, namely negentropy. It is possible to use another physically scarce resource instead, but there is no alternative to the universal scarcity of negentropy. As maaku puts it, &quot;I could be an AI trapped in a simulation with no knowledge of the outside world other than the foundational laws of physics, and from that be able to assert the validity of proof-of-work.&quot;.</i><p>(Really it has nothing to do with currency. Sorry folks.)
评论 #9050778 未加载
评论 #9051020 未加载