I agree. We are going to open-source everything before we’re done and encourage everyone to contribute. The more manpower the better…
We’re just going to finish building a general-purpose base with our new merkle trees et al. so people can start build atop of it easily. It’s hard enough as is so hopefully this will guide the way.
RZKPoW 🌩️ — Solving the Vulnerabilities of SPV with Layer 1 ZKPs.
https://gist.github.com/ColbySerpa/767aff85632bbee772a40b912a892c2c
Interesting! Sounds promising. 🔑
💜 
I’d prefer a photonic ASIC machine if it were possible, to get the best of both worlds.
Rather than the attacker* being left with functional hardware they can resell or use for other purposes after the attack…
Rather than the attack being left with functional hardware they can resell or use for other purposes after the attack…
Stanford researchers implement photonic mining chip in conjunction with new hash algorithm.
If mining centralization becomes problematic (unlikely), photonic mining could mitigate.
DoD (AFOSR) funded 👀
https://opg.optica.org/optica/fulltext.cfm?uri=optica-10-5-552&id=530125
“…photonic hardware used in hash protocols can also be used for other applications, i.e., the hardware is not necessarily an application-specific device.”
The more I think about it, the more it seems this quote is an extreme security risk… not a desirable feature like it seems.
The inability to reuse ASICs for anything other than mining raises the cost of attacking the network, because the attacker will be left with a bunch of near-useless paper weights (the ASICs).

