@jony_levin @adam3us @TheBlueMatt If it hasn't been studied then why has it been deployed?
-
-
@NickSzabo4@TheBlueMatt@adam3us@jony_levin Confused. Did I miss the req where you're not allowed to build something w/o writing a paper? -
@starkness@TheBlueMatt@adam3us@jony_levin You shouldn't expect folks to be convinced it's secure if you haven't written paper showing so. -
@starkness@TheBlueMatt@adam3us@jony_levin It's called computer science. -
@starkness@TheBlueMatt@adam3us@jony_levin This all besides the fact that this network has blatant single points of attack/failure. -
@starkness@TheBlueMatt@adam3us@jony_levin Is TTP awful only if we are trusting Mike instead of Matt? Is that really your story? -
.
@NickSzabo4 the topology of relayNet was chosen by miners@TheBlueMatt complained about that. tech is a point to point network compressor. -
.
@NickSzabo4@TheBlueMatt Bitcoin is an economic incentive system, miners will do what makes profit. relayNet clearly better than SPV mining -
cant unpublish relayNet & even if we could, makes Bitcoin security worse, because Miners may SPV mine instead. SPV mining caused 4 jul fork.
- 6 more replies
New conversation -
-
-
@TheBlueMatt@NickSzabo4@adam3us@jony_levin it doesn't address any potential attack vectors or mitigations -
@brianchoffman@NickSzabo4@adam3us@jony_levin paper just points out how simple RN is, discussion of attack vectors is missing the point -
@TheBlueMatt@NickSzabo4@adam3us@jony_levin well Nick asked for a sec analysis and you said here with no analysis. That's all.
End of conversation
New conversation
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.