Bitcoin Forum
November 11, 2024, 12:00:45 AM *
News: Latest Bitcoin Core release: 28.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1] 2 »  All
  Print  
Author Topic: Assumptions required for Bitcoin existence  (Read 1859 times)
Come-from-Beyond (OP)
Legendary
*
Offline Offline

Activity: 2142
Merit: 1010

Newbie


View Profile
February 26, 2015, 04:20:18 PM
 #1

What is the minimal set of assumptions that must be correct for Bitcoin to function properly?

For example, we assume that it's possible to distinguish work done during mining of bitcoins VS work done during mining of other coins. If we wasn't able to identify blockchain belonging to Bitcoin then any coin with higher cumulative difficulty would "overwrite" work/electricity burned for Bitcoin.
Klestin
Hero Member
*****
Offline Offline

Activity: 493
Merit: 500


View Profile
February 26, 2015, 04:40:53 PM
 #2

That doesn't require any assumptions. The work isn't just performed on behalf of a particular cryptocurrency, it's performed on top of the entire existing blockchain.  You could replace the existing Bitcoin blockchain with one of your own, but it would require the cumulative processing power of the entire history of mining.
franky1
Legendary
*
Offline Offline

Activity: 4396
Merit: 4761



View Profile
February 26, 2015, 04:54:18 PM
 #3

strange for the OP (with legendary status) to have a noob question. thus i think his account got sold or hacked.

but to answer the question
even if just 2 people continue mining the bitcoin blockchain, the blockchain will continue to exist.

you cant replace bitcoins blockchain by mining another coin to overwrite it, the only thing that can happen is people prefer to VALUE another coin at a higher value than bitcoin, thus popularity swings over to another coin.

but as i said at the start even if just 2 people continue to mine bitcoins blockchain, bitcoin will still exist.

I DO NOT TRADE OR ACT AS ESCROW ON THIS FORUM EVER.
Please do your own research & respect what is written here as both opinion & information gleaned from experience. many people replying with insults but no on-topic content substance, automatically are 'facepalmed' and yawned at
Come-from-Beyond (OP)
Legendary
*
Offline Offline

Activity: 2142
Merit: 1010

Newbie


View Profile
February 26, 2015, 04:59:17 PM
 #4

So Bitcoin can function properly without any assumptions? What about a case when rogue nodes have more hashing power than honest ones?
mlferro
Sr. Member
****
Offline Offline

Activity: 252
Merit: 250


View Profile
February 26, 2015, 08:05:10 PM
 #5

So Bitcoin can function properly without any assumptions? What about a case when rogue nodes have more hashing power than honest ones?
this is definitely a very nasty problem.

cr4sh0verride
Full Member
***
Offline Offline

Activity: 189
Merit: 100


View Profile
February 26, 2015, 09:29:33 PM
 #6

I find it hard to believe that someone with a legendary status would not know the answer to this question...
Come-from-Beyond (OP)
Legendary
*
Offline Offline

Activity: 2142
Merit: 1010

Newbie


View Profile
February 26, 2015, 09:37:46 PM
 #7

I find it hard to believe that someone with a legendary status would not know the answer to this question...

Legendary status means nothing, it's just a dick length indicator on this forum.
Daedelus
Hero Member
*****
Offline Offline

Activity: 574
Merit: 500



View Profile
February 26, 2015, 09:53:36 PM
 #8

I would guess that it is assumed the mechanism that regulates difficulty can cope in extreme circumstances without getting sticky or stuck in a way that causes loss of confidence
juju
Sr. Member
****
Offline Offline

Activity: 381
Merit: 250



View Profile
February 26, 2015, 10:26:19 PM
 #9

I find it hard to believe that someone with a legendary status would not know the answer to this question...

Legendary status means nothing, it's just a dick length indicator on this forum.

I have to agree with franky1, c'mon, not sure who your trying to fool, if you have made about 200+ posts here you probably can answer these questions just by having read them at some-point when it was asked by others or you through personal research find the answers.

You have been involved with this forum for nearly 4 years and have not found the answer to your extraordinarily vague questions. Based on your question and post count, people will assume you have purchased this legendary user account.
Come-from-Beyond (OP)
Legendary
*
Offline Offline

Activity: 2142
Merit: 1010

Newbie


View Profile
February 26, 2015, 10:33:18 PM
 #10

I have to agree with franky1, c'mon, not sure who your trying to fool, if you have made about 200+ posts here you probably can answer these questions just by having read them at some-point when it was asked by others or you through personal research find the answers.

You have been involved with this forum for nearly 4 years and have not found the answer to your extraordinarily vague questions. Based on your question and post count, people will assume you have purchased this legendary user account.

Ok, so I'm a noob who purchased this account. Now, what is the answer?
newIndia
Legendary
*
Offline Offline

Activity: 2226
Merit: 1052


View Profile
February 26, 2015, 10:33:45 PM
 #11

So Bitcoin can function properly without any assumptions? What about a case when rogue nodes have more hashing power than honest ones?

From your trust it seems you are an NXT dev. I wonder how an NXT dev can ask these Qs !!!

Come-from-Beyond (OP)
Legendary
*
Offline Offline

Activity: 2142
Merit: 1010

Newbie


View Profile
February 26, 2015, 10:37:53 PM
 #12

Well guys. I see you try to avoid answering this simply question which makes me suspect that you hide something. Let me guess, Bitcoin is flawed and works only because it's controlled by Bitcoin Foundation?
juju
Sr. Member
****
Offline Offline

Activity: 381
Merit: 250



View Profile
February 26, 2015, 10:49:51 PM
 #13

I have to agree with franky1, c'mon, not sure who your trying to fool, if you have made about 200+ posts here you probably can answer these questions just by having read them at some-point when it was asked by others or you through personal research find the answers.

You have been involved with this forum for nearly 4 years and have not found the answer to your extraordinarily vague questions. Based on your question and post count, people will assume you have purchased this legendary user account.

Ok, so I'm a noob who purchased this account. Now, what is the answer?

Franky1 largely answered this but I can take a crack real quick:

What is the minimal set of assumptions that must be correct for Bitcoin to function properly?
- Electricity, Internet, Two computers which are networked together running compatible Bitcoin Clients.

For example, we assume that it's possible to distinguish work done during mining of bitcoins VS work done during mining of other coins. If we wasn't able to identify blockchain belonging to Bitcoin then any coin with higher cumulative difficulty would "overwrite" work/electricity burned for Bitcoin.

- Since every single block in the chain includes a hash of the entire previous blocks data, this would be fine with your assumptions, for the user to "overwrite" they will actually have to be using the exact same blockchain as everyone else to with the exact same data previously hashed as everyone else in the world. Otherwise they will be adding blocks to their alternative blockchain that no network participants will recognize as the real chain because the alternative chain would never be able to grow longer than the real blockchain read section 11: https://bitcoin.org/bitcoin.pdf

The attackers chain would always be behind, unless they held a significant portion of the network like pointed out by others previously.

Come-from-Beyond (OP)
Legendary
*
Offline Offline

Activity: 2142
Merit: 1010

Newbie


View Profile
February 26, 2015, 10:53:56 PM
 #14

So we have 3 assumptions:

1. We can identify work done for Bitcoin
2. We can communicate with other participants
3. Attacker doesn't have too much hashing power

Is it enough?
onemorebtc
Sr. Member
****
Offline Offline

Activity: 266
Merit: 250


View Profile
February 26, 2015, 10:58:45 PM
 #15

So we have 3 assumptions:

1. We can identify work done for Bitcoin
2. We can communicate with other participants
3. Attacker doesn't have too much hashing power

Is it enough?

point 1 isnt an assumption as it is proven through mathematics (in case you think its an assumption please add that 1+1=2 keeps true as well - it is also needed Wink.

we will always need some kind of calculator: humans are just too slow

bandwidth and latency is also interesting as it defines bitcoins upper bound

transfer 3 onemorebtc.k1024.de 1
stevenh512
Full Member
***
Offline Offline

Activity: 137
Merit: 100



View Profile
February 27, 2015, 12:32:47 AM
 #16

1. We can identify work done for Bitcoin

Not an assumption, this is provably true, the math involved is not capable of lying. Each block is built on the previous, they only "fit" into the blockchain if they are built on a block that already exists (along with other constraints.. must be a valid block, must be at least n difficulty, must have a valid coinbase transaction, etc). Ultimately, all of these blocks are built on top of Bitcoin's unique genesis block which is set in stone in the source code of bitcoin-core and you can identify work done for Bitcoin because it can be mathematically proven that each and every block in the blockchain is built on top of Bitcoin's unique genesis block. There is no way a Namecoin block, for example, can become part of the Bitcoin blockchain (or vice-versa) because it's built on top of the wrong blockchain and genesis block. There's also no way the Namecoin blockchain could replace Bitcoin's or vice-versa for the same reason.

Pretty much the only way to replace the whole Bitcoin blockchain would be to start over from the genesis block with more computing power than has been put into mining so far and eventually catch up to and pass the real blockchain (at which point, your chain becomes the real blockchain). In practice it's much harder than it seems, not only do you need a great deal more computing power than all the ASICs on the market at the moment, you also have certain checkpoint blocks which are set in stone in the bitcoin core source code and those block hashes also have to match known values.. so you'd also effectively have to break SHA256 unless you're just starting from the most recent checkpoint (a lot easier, but there still aren't enough ASICs on the market for this to be a realistic attack)

This signature intentionally left blank.
Come-from-Beyond (OP)
Legendary
*
Offline Offline

Activity: 2142
Merit: 1010

Newbie


View Profile
February 27, 2015, 10:31:47 AM
 #17

1. We can identify work done for Bitcoin

Not an assumption, this is provably true, the math involved is not capable of lying. Each block is built on the previous, they only "fit" into the blockchain if they are built on a block that already exists (along with other constraints.. must be a valid block, must be at least n difficulty, must have a valid coinbase transaction, etc). Ultimately, all of these blocks are built on top of Bitcoin's unique genesis block which is set in stone in the source code of bitcoin-core and you can identify work done for Bitcoin because it can be mathematically proven that each and every block in the blockchain is built on top of Bitcoin's unique genesis block. There is no way a Namecoin block, for example, can become part of the Bitcoin blockchain (or vice-versa) because it's built on top of the wrong blockchain and genesis block. There's also no way the Namecoin blockchain could replace Bitcoin's or vice-versa for the same reason.

Pretty much the only way to replace the whole Bitcoin blockchain would be to start over from the genesis block with more computing power than has been put into mining so far and eventually catch up to and pass the real blockchain (at which point, your chain becomes the real blockchain). In practice it's much harder than it seems, not only do you need a great deal more computing power than all the ASICs on the market at the moment, you also have certain checkpoint blocks which are set in stone in the bitcoin core source code and those block hashes also have to match known values.. so you'd also effectively have to break SHA256 unless you're just starting from the most recent checkpoint (a lot easier, but there still aren't enough ASICs on the market for this to be a realistic attack)

Imagine that Bitcoin is forked into 2 branches: 1 MB and 20 MB. Now we have a fragment where all blocks are identical. If the latest checkpoint is below the fork then we see that assumption #1 is required.
onemorebtc
Sr. Member
****
Offline Offline

Activity: 266
Merit: 250


View Profile
February 27, 2015, 10:34:37 AM
 #18

1. We can identify work done for Bitcoin

Not an assumption, this is provably true, the math involved is not capable of lying. Each block is built on the previous, they only "fit" into the blockchain if they are built on a block that already exists (along with other constraints.. must be a valid block, must be at least n difficulty, must have a valid coinbase transaction, etc). Ultimately, all of these blocks are built on top of Bitcoin's unique genesis block which is set in stone in the source code of bitcoin-core and you can identify work done for Bitcoin because it can be mathematically proven that each and every block in the blockchain is built on top of Bitcoin's unique genesis block. There is no way a Namecoin block, for example, can become part of the Bitcoin blockchain (or vice-versa) because it's built on top of the wrong blockchain and genesis block. There's also no way the Namecoin blockchain could replace Bitcoin's or vice-versa for the same reason.

Pretty much the only way to replace the whole Bitcoin blockchain would be to start over from the genesis block with more computing power than has been put into mining so far and eventually catch up to and pass the real blockchain (at which point, your chain becomes the real blockchain). In practice it's much harder than it seems, not only do you need a great deal more computing power than all the ASICs on the market at the moment, you also have certain checkpoint blocks which are set in stone in the bitcoin core source code and those block hashes also have to match known values.. so you'd also effectively have to break SHA256 unless you're just starting from the most recent checkpoint (a lot easier, but there still aren't enough ASICs on the market for this to be a realistic attack)

Imagine that Bitcoin is forked into 2 branches: 1 MB and 20 MB. Now we have a fragment where all blocks are identical. If the latest checkpoint is below the fork then we see that assumption #1 is required.

mining has nothing to do with checkpoints. they are a relict which is no longer needed excapt for fasten up an initial sync.

when bitcoin forks every miner who uses the new software is mining on the new chaing and every miner on the old one is mining the old chain.

so no assumption needed: its all mathematic nothing more

transfer 3 onemorebtc.k1024.de 1
Come-from-Beyond (OP)
Legendary
*
Offline Offline

Activity: 2142
Merit: 1010

Newbie


View Profile
February 27, 2015, 10:49:23 AM
 #19

mining has nothing to do with checkpoints. they are a relict which is no longer needed excapt for fasten up an initial sync.

when bitcoin forks every miner who uses the new software is mining on the new chaing and every miner on the old one is mining the old chain.

so no assumption needed: its all mathematic nothing more

How will you know which blockchain to download if you don't know which of the 2 is the correct one?
onemorebtc
Sr. Member
****
Offline Offline

Activity: 266
Merit: 250


View Profile
February 27, 2015, 10:51:34 AM
 #20

mining has nothing to do with checkpoints. they are a relict which is no longer needed excapt for fasten up an initial sync.

when bitcoin forks every miner who uses the new software is mining on the new chaing and every miner on the old one is mining the old chain.

so no assumption needed: its all mathematic nothing more

How will you know which blockchain to download if you don't know which of the 2 is the correct one?

the one which contains most work and follows the protocol specification of my client (changed blocksize would be another protocol)

transfer 3 onemorebtc.k1024.de 1
Pages: [1] 2 »  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!