Bitcoin Forum
June 01, 2024, 04:18:43 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: [1]
1  Bitcoin / Development & Technical Discussion / Re: RFC: Remove mining from bitcoin? on: November 10, 2010, 12:21:25 PM
I like the idea of separating the daemon core from the GUI. That way others can build their own interfaces for using bitcoin like a KDE version for my desktop or a web interface.

Oooh.. I do like the idea of a bitcoin daemon presenting itself through a KDE Plasma widget...  Cool

Either way, I have been thinking about the whole mining aspect of Bitcoin these last weeks, since the difficulty has gone through the roof. It would be nice to have the whole generating part be (more) independent of processing power, and more balanced towards the amount of time one puts in. However, I think most alternatives will, sooner or later, fall victim to people using their non-bitcoin wallets in order to change a new more balanced way of generating bitcoins in their favor.

If generating would be dependent on time spent, people would simply spawn multiple processes, virtual machines, etc. If generation would be dependent on bandwidth spent (as a Tor middleman node perhaps?  Wink), people would invest in broadband connections, servers in datacenters, etc. If generation would be shifted from something GPU-optimized towards something only CPU's are good at computing, people would invest in CPU's.

As I am running out of ideas, I would like to add that I too am in favor of having Bitcoin default to 10/15% of a CPU core generating for the sake of network stability and security. In fact, it would be nice if Bitcoin allowed me to select percentage in addition to number of cores. I have no clue however if that is easily added or something incredibly complicated to code.
2  Bitcoin / Development & Technical Discussion / Suggestion: bitcoin.org SSL cert from self-signed -> CAcert on: November 10, 2010, 12:05:28 PM
I am aware that this feature request may be rather low priority, but I wanted to put it out here anyway. My suggestion is to switch from the current self-signed SSL certificate to one from CAcert. This way we have the benefit of working with a more widely accepted certificate (yesyes, still not in most main browsers, however still better than self-signed) and working with a more open approach to SSL certificates.

Especially when browsing bitcoin.org using Tor, I prefer to use SSL in order to prevent exit nodes from eavesdropping.
3  Bitcoin / Development & Technical Discussion / Re: Gentoo Linux Ebuild on: October 08, 2010, 08:03:05 AM
As CUDA isn't in the main releases yet, I'm not going to include it (my goal is to get it as stable as possible to get it included into the main gentoo tree). Mizerydearia is taking care of the live ebuild and might want to include it.

Thanks for the replies, getting it into the main tree is indeed a lot more important. Good luck! Smiley
4  Bitcoin / Development & Technical Discussion / Re: Gentoo Linux Ebuild on: October 04, 2010, 06:13:54 PM
Any chance of a CUDA use flag, maybe restricted to a certain revision? Grin
5  Bitcoin / Development & Technical Discussion / Re: Generating Bitcoins with your video card (OpenCL/CUDA) on: October 02, 2010, 06:49:21 AM
Here's the latest version of my CUDA client.  I've added some options to fine tune performance, and to allow multiple clients to run on the same machine to utilize more than one CUDA device.

full source

Hmm.. I am unable to download the full source...

Quote from: MediaFire
NOTICE: No servers are currently available with the requested data on them. Please retry your request in a moment.

...anyone who was able to download and build this release?
6  Bitcoin / Development & Technical Discussion / Re: BitTrust coins ? Is is possible to make a P2P trust system like bitcoin ? on: October 02, 2010, 06:33:28 AM
Wouldn't it be easiest to simply use PGP for this? If someone posts or emails his Bitcoin address and signs the message with his private PGP key, you can determine whether you trust the identity and trustworthiness associated with said PGP key (and web of trust) and therefore whether you trust the bitcoin address itself.

But you can't prove that the owner of the PGP key is the same as the owner of the bitcoin address, because the bitcoin address is the public key of the keypair.  What is to say that you try to spoof someone into thinking that you own an address belonging to someone else by taking one of their addresses and signing it?  I don't know why someone would want to do such a thing, but it could form the basis of a 'man in the middle' attack.

True, using a system outside of Bitcoin itself, opens you up for loads of theoretical and presumably also a couple of real life attacks. Using PGP however does allow establishing trust in a certain way: a bitcoin address signed by a PGP key held by a friend, or a friend of a friend, should indicate that there's a kind of trustworthiness associated with that bitcoin address. After all, the one who holds the PGP private key has announced the authenticity or ownership of that particular bitcoin address.

Now, it could be that the private PGP key is compromised. In that case the original owner should have revoked the PGP key, thereby revoking the associated trust. Also, if an attacker gains access to your private PGP key, there would usually be very little between him and your bitcoin wallet as well, so a compromised PGP key would most likely mean your bitcoin wallet is compromised as well.
7  Bitcoin / Development & Technical Discussion / Re: BitTrust coins ? Is is possible to make a P2P trust system like bitcoin ? on: October 01, 2010, 11:09:29 PM
Wouldn't it be easiest to simply use PGP for this? If someone posts or emails his Bitcoin address and signs the message with his private PGP key, you can determine whether you trust the identity and trustworthiness associated with said PGP key (and web of trust) and therefore whether you trust the bitcoin address itself.
Pages: [1]
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!