Engineering doesn’t exist without constraints. Decentralized technology doesn’t receive constraints without an active adversary.https://twitter.com/backus/status/995893320898428928 …
-
Show this thread
-
File sharing had active technological (https://en.wikipedia.org/wiki/Torrent_poisoning …) and legal adversaries (RIAA, MPAA, etc). Tor had technological (FBI, Five eyes) and legal adversaries (countries censoring traffic). I’m not convinced cryptocurrencies have active adversaries at the same scale yet.
2 replies 0 retweets 4 likesShow this thread -
Replying to @backus
Maybe adversaries learned lessons and try different (not apparent for us now) tactics
2 replies 0 retweets 0 likes
I think that is a good point. You could argue that this adversarial iteration pushed people towards BitTorrent which is hard to stop legally. A long pause to figure everything out before striking might make more sense if a Gov wanted to kill BTC for example
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.