Bitcoin Forum
June 29, 2024, 02:22:02 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 2 3 4 5 [6] 7 »  All
  Print  
Author Topic: Proof-of-stake can never scale without blowing up, because PoS isn't trustless  (Read 5363 times)
kiklo
Legendary
*
Offline Offline

Activity: 1092
Merit: 1000



View Profile
July 15, 2016, 04:36:53 AM
 #101

I added this after: Or maybe is the argument that... yes you could build a side chain that could confuse nodes up to a certain time, but that side chain will never catch up to the work added to the main chain?

So I suppose now if I am understanding the argument correctly is that.. sure you can alter the timestamps and perhaps make a confusing fork on a PoW coin, but at the end of the day it is going to be pretty much impossible to be able to have a chain that ends with the same level of computation that the main chain has.

On the other hand, using PoS, and supposing that there are no checkpoints... it would be possible to re-mine and restake all the way from the genesis block and and result in a chain that has higher trust than the main chain.

This part is where I have a problem, to achieve the above you need to be able to have a higher difficulty per chain than the main chain.
How do you accomplish this if , even without checkpoints
1. The Main Chain has more coins than you.
2. The Coin has months or years of blocks built up.
3. Coins require time before they can stake again , staking is not a continuous system. This would hamper the attempt.

I don't see how you can build up enough difficulty unless you own all of the coins, and if you do no one else cares what you do with it.
What % of the coins would you need to even attempt this as it seems you would need way more than 51% to reach the genesis block.
Also if you consider this as an issue why don't your coins use a checkpoint server?

 Cool

1. You get all the premine to yourself, and then create a chain that is longer with more difficulty. If you have all of the possible coins to stake to yourself and have them all competing, you will no doubt be able to create a chain with more trust. Most PoS coins do not have all coins available for staking attempting to stake.

2. You fudge with the timestamps and using some computation build a chain that would appear to have been created over months or years. There is no way of proving that you created a block 1 year ago other than the timestamp of that block.

3. Again you can change your timestamps. Instead of actually waiting for the time to stake, you just adjust your timestamp as if that time passed.

This whole scenario that I can see being feasible would rely on having absolutely no timestamps, as well as having no connections to active nodes. Either one of those two would make the attack not work. I guess all you could do is trick a first time syncer into being on the wrong fork. It doesn't really do anything of significance in my opinion.

Thanks for your input.


 Cool
presstab
Legendary
*
Offline Offline

Activity: 1330
Merit: 1000


Blockchain Developer


View Profile
July 15, 2016, 04:48:01 AM
 #102


1. You get all the premine to yourself, and then create a chain that is longer with more difficulty. If you have all of the possible coins to stake to yourself and have them all competing, you will no doubt be able to create a chain with more trust. Most PoS coins do not have all coins available for staking attempting to stake.

There is a Premine of say 1% in the genesis block but another 35% was created by PoW over a month period before the PoS began.
So the premine will not give you all of the coins only 1%,  this alone should block the attempt?


2. You fudge with the timestamps and using some computation build a chain that would appear to have been created over months or years. There is no way of proving that you created a block 1 year ago other than the timestamp of that block.

Ok, agree on 2 Smiley

3. Again you can change your timestamps. Instead of actually waiting for the time to stake, you just adjust your timestamp as if that time passed.

How do you account for the lower difficulty from the time where the coins have to wait before staking, this should cause the chain to have a lower difficulty.  Remembering that PoW generated more coins than the original premine.

This whole scenario that I can see being feasible would rely on having absolutely no timestamps, as well as having no connections to active nodes. Either one of those two would make the attack not work. I guess all you could do is trick a first time syncer into being on the wrong fork. It doesn't really do anything of significance in my opinion.

1. You would need to create the same amount of blocks via PoW, by altering the timestamps you can make it have higher difficulty. Note here, that if you have less hash than was put into the original one month, then it would take longer than one month to produce a more difficult chain, could be much longer... and thats actually I suppose the point that the OP was making originally (at least one of the points).

3. Difficulty is based on the time it takes to create a block. If you have all of the coins participating in staking at once then you can easily solve more stakes, thus higher difficulty. There is no "wait time" you are manipulating the timestamps...

Projects I Contribute To: libzerocoin | Veil | PIVX | HyperStake | Crown | SaluS
kiklo
Legendary
*
Offline Offline

Activity: 1092
Merit: 1000



View Profile
July 15, 2016, 05:03:27 AM
 #103

3. Difficulty is based on the time it takes to create a block. If you have all of the coins participating in staking at once then you can easily solve more stakes, thus higher difficulty. There is no "wait time" you are manipulating the timestamps...

Don't you need to have access to the original wallet keys of the premine so you can use the coins to stake or can it be done without?

 Cool

kiklo
Legendary
*
Offline Offline

Activity: 1092
Merit: 1000



View Profile
July 15, 2016, 05:10:41 AM
 #104

1. You would need to create the same amount of blocks via PoW, by altering the timestamps you can make it have higher difficulty. Note here, that if you have less hash than was put into the original one month, then it would take longer than one month to produce a more difficult chain, could be much longer... and thats actually I suppose the point that the OP was making originally (at least one of the points).

What if I had 100x the original PoW Hash?

I am wondering if it could be done in much faster than 1 month.
If so would this not also be a threat to PoW Chains without a checkpoint?

 Cool
presstab
Legendary
*
Offline Offline

Activity: 1330
Merit: 1000


Blockchain Developer


View Profile
July 15, 2016, 05:37:31 AM
 #105

You dont need the keys, because you are mining the premine to yourself.

It would only be a thread to PoW chains if you can produce a chain that comes to the current date and has more difficulty - thus higher trust score.

Projects I Contribute To: libzerocoin | Veil | PIVX | HyperStake | Crown | SaluS
kiklo
Legendary
*
Offline Offline

Activity: 1092
Merit: 1000



View Profile
July 15, 2016, 06:19:25 AM
 #106

Thanks PressTab ,

@iamnotback

I said
Longest Chain with the Most Difficulty Wins, PoS or PoW

Presstab said
1. You get all the premine to yourself, and then create a chain that is longer with more difficulty..

It would only be a thread to PoW chains if you can produce a chain that comes to the current date and has more difficulty - thus higher trust score.

You Said:
PoS doesn't have a longest chain dufus.

Game Set & Match , You Lose.  Cheesy

 Cool
kiklo
Legendary
*
Offline Offline

Activity: 1092
Merit: 1000



View Profile
July 15, 2016, 07:54:37 AM
 #107

FYI:
Even if an Attacker or Accident manages to overwrite a portion of a Blockchain
Does this make BTC Trustless , since Manipulation by the Mining Pools actually killed the longer chain.  Cheesy
Looks like Centralized Control to me and this was in March 2013.
https://bitcoinmagazine.com/articles/bitcoin-network-shaken-by-blockchain-fork-1363144448

Funny the article was by Vitalik Buterin.

Quote

Bitcoin Network Shaken by Blockchain Fork
Mar 13, 2013 3:14 AM by Vitalik Buterin

Yesterday, the Bitcoin network experienced one of the most serious hiccups that we have seen in the past four years. Starting from block 225430, the blockchain literally split into two, with one half of the network adding blocks to one version of the chain, and the other half adding to the other. For the next six hours, there were effectively two Bitcoin networks operating at the same time, each with its own version of the transaction history. The split lasted for 24 blocks or 6 hours, finally resolving itself when one version of the chain conclusively pulled ahead of the other at block 225454, leaving the other chain largely abandoned, with only a small number of miners that are incapable of recognizing what has now become the main chain still mining it, while the bulk of the network quickly returned to normal.

The fork was first noticed at about 23:30 GMT on Monday, March 11, when “thermoman” on the bitcoin-dev IRC channel mentioned that “some client told my client it (the other host) had 225431 blocks, but blockexplorer says that currently the block count is at 225430?. Some other blockchain resources also showed 225430 blocks. Over the course of the next thirty minutes, other users started reporting more strange reports from Bitcoin client logs. Bitcoin developer Peter Wuille (“sipa” on IRC) claimed that he was on block 225435, and then soon 225439, while other sources were still reporting 225431. At 00:00 GMT March 12, sipa posted “I wonder if there’s something that triggered it on the network, a large reorganization or so”. It turned out that a blockchain reorganization, an event that happens when a client discovers a new blockchain longer (and therefore more likely to be valid) than the one it was working with before, and switches to it, was indeed what happened, and over the next few minutes everyone realized what was going on: a blockchain fork.

What had happened was the following. The latest version 0.8 release of bitcoind, by far the most popular implementation of Bitcoin used by miners, switched the database that it used to store blocks and transactions from BerkeleyDB to the more efficient LevelDB as part of an effort to reduce blockchain synchronization time. However, what the developers did not realize at the time was that by doing so they also accidentally introduced a change to the rules of the Bitcoin protocol. In order to make an update to the database, the database process must make a “lock” on the part of the database which stores that particular item of information, a mechanism implemented to prevent two changes from occurring simultaneously and accidentally corrupting the database. In a b-tree, the data structure used by BerkeleyDB to store objects, two locks are required per update. However, BerkeleyDB requires its users to set a limit to the number of locks that can be made at the same time; “If the values are too small,” the FAQ page warns, “requests for locks in an application will fail. If the values are too large, the locking subsystem will consume more resources than is necessary.” In the case of Bitcoin, the limit was 10,000. What happened in block 225430 was that a single block simultaneously affected the status of over 5,000 transactions, requiring more than 10,000 locks on the b-tree to be made at the same time. As a result, the BerkeleyDB failed, and so the older bitcoind 0.7 (and earlier versions) could not read the block. In the case of bitcoind 0.8, LevelDB has no such restrictions, so it could accept such blocks just fine. Because the Bitcoin protocol builds up the transaction history, used primarily to calculate and agree on everyone’s account balances, by creating new blocks representing roughly ten-minute time intervals’ worth of transactions on top of existing valid blocks in a chain (hence, “blockchain”), miners using bitcoind 0.8 started building up a version of the blockchain that included the offending block, while miners using bitcoind 0.7 rejected it and started working on a another blockchain of their own. Ordinary users using BitcoinQt 0.7 or platforms that rely on bitcoind 0.7 as a server saw the 0.7 fork, and everyone else saw the 0.8 fork.

With the fork in progress, the Bitcoin developers had a choice: do they support the 0.8 fork or the 0.7 fork? Ultimately, there could only be one; a monetary system cannot function if there are two different databases of how much money each person has. The 0.8 fork had much more computing power behind it, and was already eight blocks ahead by the time the community could muster any effort toward fixing the problem, and upgrading to 0.8 is something that will have to be done eventually. On the other hand, if the 0.8 fork took over, thousands of users on 0.7 would be forced to upgrade in order to use Bitcoin at all, something which would not happen if the 0.7 fork took over since both versions of bitcoind can read it. The developers quickly settled on 0.7, and the community set to work on the next task: notifying major miners and mining pool operators of what they need to do.

Over the next few hours, nearly every major Bitcoin developer and mining pool operator joined the bitcoin-dev IRC channel. Major mining pools that were using bitcoind 0.8 shut down, downgraded to 0.7, and switched back on. Merchants were also notified; most large businesses, including BitcoinStore, BitPay, SatoshiDice and MtGox, shut down deposits to protect themselves from double spend attacks. BitPay quickly turned themselves back on once their servers were on the 0.7 fork; “safe mode alerted us there’s a problem,” BitPay’s Tony Gallippi writes. “That’s when Steve jumped on IRC to see where the consensus was going, and we were back in business very quickly.” Progress on switching hash power to 0.8 appeared to be slow at first, and at block 225451, the 0.8 chain was 13 blocks longer than 0.7. But that was the furthest that the 0.8 chain would get ahead. By then, the two chains were growing roughly in lockstep, and at about 03:30 the tipping point came. The 0.7 chain quickly caught up to being only 10 blocks behind, then 8 blocks, and at 06:19 both chains converged to the same length at block 225454, leading to nearly all remaining miners abandoning the other.

This incident will go down in history as one of the closest moments that we have come to the underlying Bitcoin protocol actually failing. But it is not the most serious breach ever made. In August 2010, a transaction in block 74638 contained two outputs summing to over 184 billion – just over 2^64 satoshis. The result was an integer overflow bug, the digital equivalent of a mechanical odometer wrapping around to zero after the car drives 999,999 kilometers. The overflow caused the software to think that the transaction contained only a small amount of BTC while in reality the outputs together had thousands of times more than the 21 million that should ever exist. A new version of the Bitcoin software had to be published, the blockchain was forked, and a new, valid, chain overtook the old one at block 74691 – 53 blocks after the original fork. This time, it only took 24 blocks, and it was not even a life-critical threat to the system – if the developers had done nothing, then Bitcoin would have carried on nonetheless, only causing inconvenience to those bitcoind and BitcoinQt users who were on 0.7 and would have had to upgrade. The economic damage was significant, but fairly small; the only monetary losses that have been reported are the $26,000 USD worth of mining block rewards from the 24 mined blocks of 25 BTC that are now forever lost in the now abandoned chain, as well as a $10,000 double spend against OKPay. Aside from the lost mining revenue and this double spend, transactions were not affected and no bitcoins were “lost”; any transaction that was included in the now abandoneded chain was included in the new chain as well, so any bitcoins that were spent during the fork are now at their proper destinations.

In a way, this was the best possible time for such a thing to happen. The Bitcoin price was on a steady uptrend, and so the 24% drop in price that occurred at the time of the incident was quickly reversed, and as of the time of this writing Bitcoin stands at $44-$46, down from $48 the day earlier but up from $36 one week before. Public media attention on Bitcoin is very much positive, and rather than attacking Bitcoin as they would have in 2011 many journalists actually praised the Bitcoin development team on their rapid response. Ars Technica’s Timothy B Lee wrote a neutral piece on the event, writing that “the incident will be an important test of the cryptocurrency’s decentralized governance structure”, and an article at ecurrency.ec on the subject was entitled “Bitcoin software bug has been rapidly resolved”.

However, the incident opens up serious questions about the nature of the Bitcoin protocol, and puts into the spotlight some uncomfortable facts about Bitcoin’s notion of “decentralization”. Most security protocols, including encryption algorithms, hash algorithms and full-scale protocols, have dozens of implementations in many different programming languages, and the protocol specification is determined by a clear standard against which any individual implementation can be checked for compliance. In the case of Bitcoin, however, things are different. Although there is technically a standard on the Bitcoin wiki pages, it has at times been poorly updates, and the reality is that the bitcoind implementation is the standard, and nearly all miners on the Bitcoin network are using some version of it. There are a few alternative implementations, the most complete one being Amir Taaki’s libbitcoin, with Mike Hearn’s BitcoinJ (written in Java) close behind, but so far they have gained very little traction in use with mining, and, what’s more, there is a small portion of the Bitcoin development community which is actively against the idea of using multiple codebases.

Fortunately, most Bitcoin developers do not support this viewpoint, although many have come out in favor of keeping a healthy level of prudence. Mike Hearn wrote the following on the Bitcointalk forums in June 2011:

    Gavin wrote to me only days after the BitCoinJ release to tell me how happy he was to see an alternative implementation. Satoshi expressed very similar sentiments. Nobody is against alternative implementations.
    What some people, especially Satoshi, have said is that there’s an unusual amount of risk involved with reimplementing the full system and using that reimplementation to mine. Bitcoin is very complex and if you aren’t skilled and very thorough you are likely to diverge from its behavior in small, hard to detect ways. This can fork the chain and split the economy. It’s one of the few things that could instantly kill Bitcoin beyond legal harassment of its users.

Lead Bitcoin developer Gavin Andresen replied to another poster in the same thread: “Really? I’ve been encouraging alternative implementations, who is the power-hungry core developer?”, and in November 2012 he wrote in a Bitcoin Foundation update that “part of the solution is to encourage alternative implementations that make different trust/convenience tradeoffs than the reference implementation. There has been a lot of behind-the-scenes work on cross-implementation testing (the “testnet3? blockchain contains hundreds of transaction validation test cases, for example), and new features are being added to the protocol to support alternative implementations”

But alternative implementations are not just useful for supporting different trust/convenience tradeoffs. They are also crucial in making Bitcoin’s claim of decentralization a reality. If there had instead been five distinct Bitcoin implementation in use at the time of the fork, what would have happened is that one of the five would have recognized the wrong blockchain and forked off, leading to a loss of revenue for a small number of miners and requiring the users of clients using that implementation to upgrade. The aberrant implementation’s fork of the blockchain would end up much weaker than the others right from the start, so the risk of double spend attacks would be minimal. One can argue that there will be a greater number of forking incidents with more implementations, but each one will be smaller in effect, and testing all implementations together on the testnet before release would reduce the number of bugs that slip into production software to about the same frequency as we see today.

The other aspect of Bitcoin’s decentralization that this incident calls into question is that of mining pools. The reason why the controlled switch to the 0.7 fork was even possible was that over 70% of the Bitcoin network’s hash power was controlled by a small number of mining pools and ASIC miners, and so the miners could all be individually contacted and convinced to immediately downgrade. Another article on the fork reads [Russian]: “the real problem is not even in the code supporting the Bitcoin network; bugs are everywhere. Rather, it’s the matter of who controls it. This event clearly showed that even such a well thought-out system is controlled by the will of a very small number of people – particularly, the operators of mining pools. Over 70% of new blocks right now are being found on pools, and not on individual solo miners. The underlying idea of the system was that the benevolent majority can stop a small number of attackers, but in the present time it is simply not working. The winner in a possible takeover will be the one with greater computing power, and no one else.” Bitcoin is clearly not at all the direct democracy that many of its early adherents imagined, and, some worry, if a centralized core of the Bitcoin community is powerful enough to successfully undertake these emergency measures to set right the Bitcoin blockchain, what else is it powerful enough to do? Force double spends to reverse million-dollar thefts? Block or even redirect transactions known to originate from Silk Road? Perhaps even modify Bitcoin’s sacred 21 million currency supply limit?

However, a strong argument can be made that such fears are very unlikely to materialize. The reason why has nothing to do with the specific identities of the Bitcoin mining pool operators or the cohesiveness of the Bitcoin mining community; rather, it’s the fact that Bitcoin mining is still in fact quite decentralized; it simply is decentralized in a different way. Taking a political analogy, the closest equivalent would be a liquid democracy: a hybrid of direct and representative democracy where people can either vote for individual bills by themselves or assign politicians – with the proviso that if they do not like what a given politician is doing they can switch to assigning their voting power to someone else at any time. Back in the world of Bitcoin, although much of the Bitcoin network’s hash power is concentrated with mining pool operators in practice, every individual miner can switch from one pool to another almost instantly, so if a coalition of mining pool operators decides to start violating the Bitcoin protocol miners can simply switch to any pool that remains honest, instantly depriving the miscreants of their power. Although no mining pool has attempted to actively subvert the Bitcoin protocol so far, this kind of “voting” has been done before; in 2011, there were several incidents where the mining pool Deepbit pushed above 50% of the total network hash power, and in each case there was a mass exodus of miners toward other pools to balance things out. Although the nominal power may rest with the mining pool operators, the feedback of the community is always only one step away.

Altogether, the incident was handled very well, and all parts of the Bitcoin community should congratulate themselves for their speedy resolution of the problem and their unconditional cooperation. The Bitcoin community is not always in perfect harmony; Bitcoin gambling site SatoshiDice and a number of Bitcoin developers, notably Luke Dashjr, are usually at odds over concerns that SatoshiDice’s large transaction count is bloating the Bitcoin blockchain, but yesterday differences were laid aside as the community worked together to solve the problem. We also learned a lot, and merchants are likely to be much more prepared for such incidents in the future, perhaps implementing techniques like automatic fork detection to handle forks and avoid double spends without immediate manual intervention. Before today, many people knew that some test for the Bitcoin network would come, whether at the 1 MB block size limit or else where, but just how the community would handle such a thing was an unknown. Now, the test has come and gone, and how the Bitcoin community handled the test is known to everyone: we passed with flying colors.


Passed the Centralized Control Test by killing the Longer Chain.  Tongue

 Cool
iamnotback (OP)
Sr. Member
****
Offline Offline

Activity: 336
Merit: 265



View Profile
July 15, 2016, 02:23:09 PM
 #108

The troll apparently didn't comprehend, so I'll repeat in hopes he might understand with enough repetition (but that is doubtful):

Goodbye asshat, you are now on Ignore because you write nonsense and you are not even a programmer.

kiklo you are not qualified to debate me. Any person who is qualified and reads what I have written to you, is shaking their head wondering how you can be such a dumb jackass. I have been warned to never argue with an idiot, because an idiot doesn't know when they are incorrect.


kiklo
Legendary
*
Offline Offline

Activity: 1092
Merit: 1000



View Profile
July 16, 2016, 12:53:53 AM
 #109

The fact you only have insults left shows how stupid you really are ASSHAT.

Hey did that post cost you $300 or were you just lying again.
Cause if someone would pay me $300 per hour, I would Ignore the Hell out of you.  Cheesy

Sad part is If you ignore someone, you don't keep talking about them.
So you even Failed IGNORE SCHOOL!    Smiley


FYI:
I will be calling your uncreated coin Fart Bubble from now on.
Cheesy


 Cool
iamnotback (OP)
Sr. Member
****
Offline Offline

Activity: 336
Merit: 265



View Profile
July 16, 2016, 12:23:38 PM
Last edit: July 16, 2016, 06:54:35 PM by iamnotback
 #110

Example of why PoS block chains can't be trusted to not violate the protocol and bailout themselves (leading to corruption and fighting over who controls the resource):

In the security announcement CEO of Steemit Ned Scott said:

“User accounts and wallets are not at risk, and we hope to soon reactivate the Steemit website to normal order. Any users whose accounts were compromised will be completely reimbursed.”

Then just like Ethereum, Steem is not a trustless, permissionless, decentralized block chain. But this is expected, because all PoS block chains must be centralized with checkpoints and thus are under top-down control.

Steem is a corporate controlled block chain, which is the antithesis of why we created block chains to remove us from the certain failure of democracy and governance. We need block chains to be immutable and changable by no one after they are launched. I'll be trying to demonstrate a new design for a block chain which has this immutable property (even more so than Satoshi's original design).



Second hack may be underway:

it looks quite serious someone have found a way to add ilimited steems to the post, look the video (i can not confirm if this is real or fake)

https://www.reddit.com/r/btc/comments/4t4c2l/giving_unlimited_amount_of_steem_to_users_without/

Hopefully the same hacker who drained the DAO is going to put an end to this Streemit retarded shit as well.

May only be a GUI/frontend bug:

looks like you don't need to know much to become a r/btc mod LOL (it's just a GUI bug, he did not check if it's real on the blockchain)

https://twitter.com/btsfav/status/754381407263289345

Bitshares dude claims maintenance is due to hacker stealing more funds, so there is a second hack:

some accounts did not change their passwords, besides the billion warnings posted all day. the hacker cleaned those leftovers today.
steemit.com is now in maintenance mode

Don't you love this corporate run block chain shit.

Why are the fucking passwords (and private keys for signing transactions) stored any where except on the user's private wallet on the user's computer. Probably because they wanted the system to be easy to login from any computer the user might change to. So probably they have a process where you can take control of your private key if you are sophisticated enough. But this is what happens when you make a way for users to earn and hold $1000s and give them a default private key mgmt that stores it on the corporate server. Another reason that their retarded quadratic skewing of payouts in order to make all users jealous and irrational, has another bad effect that it weakens security.
Wind_FURY
Legendary
*
Offline Offline

Activity: 2968
Merit: 1852



View Profile
July 16, 2016, 01:43:15 PM
Last edit: July 16, 2016, 02:15:49 PM by Wind_FURY
 #111

To the audience. Keep in mind that iamnotback and kiklio are only one person.

Just kidding. The discussions are interesting but are way over my head. I still try to read and understand them though.

██████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
██████████████████████
.SHUFFLE.COM..███████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
█████████████████████
████████████████████
██████████████████████
████████████████████
██████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
██████████████████████
██████████████████████
██████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
.
...Next Generation Crypto Casino...
iamnotback (OP)
Sr. Member
****
Offline Offline

Activity: 336
Merit: 265



View Profile
July 16, 2016, 05:26:23 PM
 #112

Charles has agreed that PoS requires centralized checkpointing:

https://www.youtube.com/watch?v=6zP4Chk8g7A#t=1632
criptix
Legendary
*
Offline Offline

Activity: 2464
Merit: 1145


View Profile
July 16, 2016, 05:52:43 PM
 #113

Charles has agreed that PoS requires centralized checkpointing:

https://www.youtube.com/watch?v=6zP4Chk8g7A#t=1632

about the need of checkpointing in PoS please take a look at vrc and their PoST whitepaper if you have time:

https://bitcointalk.org/index.php?topic=602041.0

                     █████
                    ██████
                   ██████
                  ██████
                 ██████
                ██████
               ██████
              ██████
             ██████
            ██████
           ██████
          ██████
         ██████
        ██████    ██████████████████▄
       ██████     ███████████████████
      ██████                   █████
     ██████                   █████
    ██████                   █████
   ██████                   █████
  ██████
 ███████████████████████████████████
██████████████████████████████████████
 ████████████████████████████████████

                      █████
                     ██████
                    ██████
                   ██████
                  ██████
                 ████████████████████
                 ▀██████████████████▀
.LATTICE - A New Paradigm of Decentralized Finance.

 

                   ▄▄████
              ▄▄████████▌
         ▄▄█████████▀███
    ▄▄██████████▀▀ ▄███▌
▄████████████▀▀  ▄█████
▀▀▀███████▀   ▄███████▌
      ██    ▄█████████
       █  ▄██████████▌
       █  ███████████
       █ ██▀ ▀██████▌
       ██▀     ▀████
                 ▀█▌
 

             ▄████▄▄   ▄
█▄          ██████████▀▄
███        ███████████▀
▐████▄     ██████████▌
▄▄██████▄▄▄▄█████████▌
▀████████████████████
  ▀█████████████████
  ▄▄███████████████
   ▀█████████████▀
    ▄▄█████████▀
▀▀██████████▀
    ▀▀▀▀▀
presstab
Legendary
*
Offline Offline

Activity: 1330
Merit: 1000


Blockchain Developer


View Profile
July 16, 2016, 07:38:24 PM
 #114

Charles has agreed that PoS requires centralized checkpointing:

https://www.youtube.com/watch?v=6zP4Chk8g7A#t=1632

You will need some hard checkpoints. In my opinion, a widely disbursed and actively staked coin does not need a checkpoint server. So the centralization would come from the source code, just like the protocol rules do for every coin.

Projects I Contribute To: libzerocoin | Veil | PIVX | HyperStake | Crown | SaluS
criptix
Legendary
*
Offline Offline

Activity: 2464
Merit: 1145


View Profile
July 16, 2016, 07:41:43 PM
 #115

Charles has agreed that PoS requires centralized checkpointing:

https://www.youtube.com/watch?v=6zP4Chk8g7A#t=1632

You will need some hard checkpoints. In my opinion, a widely disbursed and actively staked coin does not need a checkpoint server. So the centralization would come from the source code, just like the protocol rules do for every coin.

you either have checkpoints or you dont. having just some hardcoded checkpoints makes no sense? Huh

                     █████
                    ██████
                   ██████
                  ██████
                 ██████
                ██████
               ██████
              ██████
             ██████
            ██████
           ██████
          ██████
         ██████
        ██████    ██████████████████▄
       ██████     ███████████████████
      ██████                   █████
     ██████                   █████
    ██████                   █████
   ██████                   █████
  ██████
 ███████████████████████████████████
██████████████████████████████████████
 ████████████████████████████████████

                      █████
                     ██████
                    ██████
                   ██████
                  ██████
                 ████████████████████
                 ▀██████████████████▀
.LATTICE - A New Paradigm of Decentralized Finance.

 

                   ▄▄████
              ▄▄████████▌
         ▄▄█████████▀███
    ▄▄██████████▀▀ ▄███▌
▄████████████▀▀  ▄█████
▀▀▀███████▀   ▄███████▌
      ██    ▄█████████
       █  ▄██████████▌
       █  ███████████
       █ ██▀ ▀██████▌
       ██▀     ▀████
                 ▀█▌
 

             ▄████▄▄   ▄
█▄          ██████████▀▄
███        ███████████▀
▐████▄     ██████████▌
▄▄██████▄▄▄▄█████████▌
▀████████████████████
  ▀█████████████████
  ▄▄███████████████
   ▀█████████████▀
    ▄▄█████████▀
▀▀██████████▀
    ▀▀▀▀▀
kiklo
Legendary
*
Offline Offline

Activity: 1092
Merit: 1000



View Profile
July 16, 2016, 08:33:02 PM
 #116

Charles has agreed that PoS requires centralized checkpointing:

https://www.youtube.com/watch?v=6zP4Chk8g7A#t=1632

You will need some hard checkpoints. In my opinion, a widely disbursed and actively staked coin does not need a checkpoint server. So the centralization would come from the source code, just like the protocol rules do for every coin.

The above opinion is accurate.
As Hyperstake, ZEIT, Mintcoin, and others, only update their checkpoints when they update the wallet code.
No difference from BTC or Monero (PoW coins), since they also only update their checkpoints when they update their wallet.

Using Charles as a reference, shows you grasping at straws.
Charles was fired from ethereum
Background: this is not the first major project Charles has left (he also left bitshares)
Are you going to offer him a job to promote your new coin FART BUBBLE.
 Cheesy
https://www.reddit.com/r/CryptoCurrency/comments/282m8m/charles_hoskinson_left_ethereum/
Quote
Charles's absence from the new leadership team has no impact on the ether sale or the timeline of the Ethereum genesis block launch or its feature set; if you want to see how progress on actually building Ethereum is going, the only place where you can really see that is simply by looking at the level of activity on our github repos (my own efforts have been focused on the serpent/cpp branch, allowing Gav and Jeff to easily integrate Serpent compilation into their C++ and Go clients). We are not aware of the details of what Charles is now working on, but we wish him well.

 Cool

 
iamnotback (OP)
Sr. Member
****
Offline Offline

Activity: 336
Merit: 265



View Profile
July 16, 2016, 08:41:56 PM
Last edit: July 16, 2016, 09:05:25 PM by iamnotback
 #117

Charles has agreed that PoS requires centralized checkpointing:

https://www.youtube.com/watch?v=6zP4Chk8g7A#t=1632

You will need some hard checkpoints. In my opinion, a widely disbursed and actively staked coin does not need a checkpoint server. So the centralization would come from the source code, just like the protocol rules do for every coin.

Sorry you would not know who to trust. Votes can be Sybil attacked. You can't use the block chain to determine who is not a Sybil, because the block chain itself can be a mirage when you are trying to sync.

PoS is self-referential. There is nothing you can do to solve that. That is why it is always centralized.

If you mean the source code can be the centralized repository for checkpoints, then yes of course I agree but only to the extent it can upgraded frequently enough. Isn't that just another way of saying "a centralized checkpoint server". PoW doesn't require this. PoS does.

Sorry I don't want to discuss about this more, because it is not interesting. We experts have long since realized trustless, decentralization is impossible for PoS. Perhaps the only plausible fix might be a Web of Trust, but even these can be gamed:

Unfortunately, altruism-prime cannot be relied on exclusively, because the value of coins arising from protocol integrity is a public good and will thus be undersupplied (eg. if there are 1000 stakeholders, and each of their activity has a 1% chance of being “pivotal” in contributing to a successful attack that will knock coin value down to zero, then each stakeholder will accept a bribe equal to only 1% of their holdings).

Many people like to think this is only academic point and not really relevant in reality or practice. I think the Ethereum hard fork proves they are wrong.

Besides PoS (even DPoS) has scaling problems that can only be solved with PoW, which I will soon demonstrate. That will be the final nail in the PoS coffin.
kiklo
Legendary
*
Offline Offline

Activity: 1092
Merit: 1000



View Profile
July 16, 2016, 08:50:14 PM
 #118

Charles has agreed that PoS requires centralized checkpointing:

https://www.youtube.com/watch?v=6zP4Chk8g7A#t=1632

You will need some hard checkpoints. In my opinion, a widely disbursed and actively staked coin does not need a checkpoint server. So the centralization would come from the source code, just like the protocol rules do for every coin.

you either have checkpoints or you dont. having just some hardcoded checkpoints makes no sense? Huh

Here is the difference,
a hard coded checkpoint gives you the protection of a checkpoint, but does not give you a single point of failure for your coin like a checkpoint server would.
Because if a Hacker can control your Checkpoint server , he can control your coin.
A Hacker can do nothing against a hard coded checkpoint , which is why PoS & PoW Devs used hard coded checkpoints.

Kito explained it best.
So much anger.  I have read previous posts debating this topic.  One thing that comes up is POS needs checkpoints but POW doesn't.  I believe POW and POS needs to have checkpoints. Here are my thoughts.  Actually these ideas are not mine just what I have read previously on the same topic.  But for new users this might help.

There is a perception that a long POW chain has a lot computation work behind it.  This is not always true.  POW difficulty changes to meet the target block generation period.  There is no guarantee that a longer block chain has more work than a shorter chain.

On POW chain it is implied that work is being done and a longer POW chain has more work on it.  This is because on honest chains which have equal difficulty targets are for most part true.  But on this topic we are not worried about honest nodes trying to reach consensus with long running nodes which already have the honest chains.

In this case we are talking "checkpoint POS vs POW". Or as I like to say, "what happens when a new node comes online in a hostile hacker zone- how does a client trust one long chain vs another."

A hacker / attacker could basically fake blocks /w fake creation times for POS and POW chains.  For POW, the attacker would generate chains with lowest allowed difficulty level and then keep it this way while generating a longer block chain.  In this way an attacker can create a valid long POW block chain with low work / energy while following all the rules. This is sometimes overlooked because people look at bitcoin chain and see tons of energy expended in the mining races. The difficulty target in POW is to maintain block generation time not to insure there is a provable amount of work being done on the chain.

Enter the trusty checkpoint.  Without the checkpoints a POS or POW would fail in this scenario. A checkpoint hash however cements the block chain up to a given date.  With checkpoints an attacker has to mount the attack after this point which is more difficult to do with both POW or POS coins.  For POW, the attacker has to reduce the difficulty target using energy.  For POS, he would have to purchase a stake to reduce difficulty to generate a new fake chain. 

So I accept checkpoints.  They are cheap and make it highly difficult for attackers to workaround it. 


 Cool
kiklo
Legendary
*
Offline Offline

Activity: 1092
Merit: 1000



View Profile
July 16, 2016, 08:57:01 PM
 #119

Charles has agreed that PoS requires centralized checkpointing:

https://www.youtube.com/watch?v=6zP4Chk8g7A#t=1632

You will need some hard checkpoints. In my opinion, a widely disbursed and actively staked coin does not need a checkpoint server. So the centralization would come from the source code, just like the protocol rules do for every coin.

Sorry you would not know who to trust. Votes can be Sybil attacked. You can't use the block chain to determine who is not a Sybil, because the block chain itself can be a mirage when you are trying to sync.

Iamnotback/Shelby does not know what he is talking about!

PoS is self-referential. There is nothing you can do to solve that. That is why it is always centralized.

If you mean the source code can be the centralized repository for checkpoints, then yes of course I agree but only to the extent it can upgraded frequently enough. Isn't that just another way of saying "a centralized checkpoint server".

Sorry I don't want to discuss about this more, because it is not interesting. We experts have long since realized this is insoluble.

Iamnotback/Shelby does not know what he is talking about, so he will pretend like this discussion is beneath him to save face.

He is still an ASSHAT, IMO

FYI:
For all that don't know, Shelby is Iamnotback's real name.
Although , he is such a liar, who knows.
iamnotback (OP)
Sr. Member
****
Offline Offline

Activity: 336
Merit: 265



View Profile
July 16, 2016, 08:58:40 PM
 #120

The troll apparently didn't comprehend, so I'll repeat in hopes he might understand with enough repetition (but that is doubtful):

Goodbye asshat, you are now on Ignore because you write nonsense and you are not even a programmer.

kiklo you are not qualified to debate me. Any person who is qualified and reads what I have written to you, is shaking their head wondering how you can be such a dumb jackass. I have been warned to never argue with an idiot, because an idiot doesn't know when they are incorrect.


Pages: « 1 2 3 4 5 [6] 7 »  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!