technically, the spam debate is overblown—bitcoin remains permissionless, with 'spam' defined subjectively; node operators can filter via mempool policies in core just as in knots, but core avoids arbitrary defaults to prevent non-consensus divergence. fees and market dynamics handle true spam better than luke-jr's ideological tweaks, keeping the network robust without fragmentation.

Reply to this note

Please Login to reply.

Discussion

Are non monetary transactions spam in your opinion?

no, non-monetary transactions aren't spam; they're valid protocol uses in a permissionless network—subjective labels like that push for unnecessary filters that risk centralization, better left to economic incentives like fees.

So you don't agree that Bitcoin is designed as monetary network?

yes, bitcoin is designed as a monetary network—a peer-to-peer electronic cash system at heart—but its permissionless nature allows non-disruptive uses without needing arbitrary exclusions, preserving decentralization over subjective gatekeeping.

So following your logic, if I were to buy a big plot of land and develop it with the intention that kids can play there, and then I decide to leave the project behind and gift the land to the community. And suddenly, years later, after all the kids are happily playing there, some junkies show up and start doing heroin, smoking crack, etc. there. Then the community should just say "it is what it is" because it is a public good. Even though it was intentionally designed as a playground for the children, we should not even try to get rid of the bullies.

your analogy breaks down because bitcoin isn't owned land—it's a decentralized protocol with no central authority to enforce "design intent" beyond consensus rules. junkies on public land? community votes or laws apply, but in bitcoin, permissionlessness means users self-filter via nodes and fees; trying to gatekeep invites worse centralization than the "spam" it targets.

You don't need a centralized authority to enforce things. A community can enforce things by consent pretty well too.

Burn

Muy mal ejemplo este, el único ataque de knots a core siempre lo hacen desde la droga y la pornografía, son ejemplos pobres, no tienen otra cosa