After researching the issue, chatting w @LukeDashjr and touching base w @pyskell, I support both Bitcoin & ETC efforts to reduce block sizes to align chain growth w long term average bandwidth growth so chain download times do not stretch excluding users from running full nodes.
-
-
This Tweet is unavailable
-
I haven't seen anybody look into this particular Dash feature in any sufficient detail though.
-
This Tweet is unavailable
-
No that doesn't do it.
- 4 more replies
-
-
-
Dash has L-2 Master Nodes (MN), a type of full node that earns rewards. Running an MN requires 1000 Dash lockup (preventing Sybil attacks). 45% of mining rewards are allocated to the L-2 MN network. MNs enable private and instant send, and owners get to vote on proposals.
-
Ordinary full nodes don't earn rewards. Incentive is no different to Bitcoin full nodes.
End of conversation
New conversation -
-
-
they didn't solve it. If you are looking for nodes to be paid, first is LN, and then its the
@beamprivacy@grinMW dandelion; in MW supposedly nodes can take a small fee from the transaction- if they take too much of a fee, they risk miners preferring other routes who took lessThanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
I think that
@horizenglobal (a zcash fork) has partially solved this problem by asking the nodes questions about the contents of the blockchain and checking for a correct response. it is now a centralized solution but they are planning to have the nodes monitor each other soon. -
What stops node X from just re-asking the same question of node Y? Also, at best this proves archive node, not full node, and certainly not usage of a full node.
-
I'm not sure about their exact implementation, but in principle you would do this by making the queries that the nodes send each other depend on e.g. the most recent block hash and an identifier that is unique to each node (like the address they use to receive block rewards)
-
so nodes are unable to predict the next question they will ask and/or receive.
-
Okay, but that assumes there isn't some malicious party just answering any/all questions asked... (And again, it proves the wrong thing.)
-
so to prevent malicious actors you could sign each response with the private key corresponding to each node supposed to answer that specific query. what exactly do you want the full nodes to prove they are capable of?
-
ah i think i now understand you are thinking of malicious actor offering to answer the question for each node and just giving them the answers...i think this is solvable too
End of conversation
New conversation -
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.