Techniques that are totally overkill an inefficient where trust is established, and wholly ineffective and irrelevant where the purpose is precisely to create trust that is a priori absent. The problem is not that the authors are idiots, but meta-idiots. Blinded by ideology.
-
-
Show this thread
-
Most people assume the comfort of an environment they can trust, then based on those assumptions fancy redesigns of the infrastructure that sustains this environment. In software as in politics, this attitude only leads to absurd designs that cause great suffering if implemented.
Show this thread
End of conversation
New conversation -
-
-
Assuming a 25% adversary is a fairly standard assumption these days. As
@ittayeyal and@el33th4xor have shown in their selfish mining paper (https://www.cs.cornell.edu/~ie53/publications/btcProcFC.pdf …), also#Bitcoin
is limited by this 25% bound. /cc @brynosaurus@LefKok -
OK, then I misread the article: it was not really about decentralization, it was about PoX miners wasting time and money to pretend they have thousands of machines while talking to themselves.
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.
Read my blog!