Avatar
Komi_Hartman
81d38469313088cce52b8a860711c21e7408860286bb3834a4d74fab717cde2e
“A specter is haunting the modern world, the specter of crypto anarchy.”

Eventually, many bitcoin maxi are potential scammers, no doubt! The details are more crucial & there’s no end that justifies their means!

Advance of 'ordinals' can attract several attacks. A single compromise & the whole timechain will be attacked. Let’s know how to apprehend them! Because no system is secure!

https://arxiv.org/pdf/1605.07524.pdf

The 'birthday paradox' shows that if you have a large number of people (m) & a finite number of people (n) then the probability that nobody in the large number of people has the same birthday as another person in the large number of people is:

Prob(nobody in large group has same birthday as another one) = 1 - (1-2/m)^n

Thus, the security of a one-way function is roughly inversely proportional to the number of invocations of the function (a function that requires m invocations to compute has a security of roughly 2^m).

If we look at the security of Bitcoin’s proof-of-work one-way function, we get the following:

Security = 2^256

In other words, the security of proof-of-work is roughly a 'constant'. A proof-of-work is considered secure if it takes '256 attempts to find a nonce that computes the desired hash'./..

Bitcoin’s proof-of-work:

Bitcoin’s proof-of-work system is based on a one-way function that’s very similar to the one-way function that hashes are based on. The one-way function in Bitcoin is defined in the Bitcoin protocol as:

The hash function H(x) = H(H(x))

The base is a 'cryptographic hash function' such as 'SHA-256', the same hash function is used for the proof-of-work hash. The key difference is that the hash function in Bitcoin is a random oracle, meaning that it’s a 'function that takes as input a number (the nonce) & returns a fixed value' (the hash of the nonce), while a hash function in Bitcoin is a one-way function that takes as input a string & returns a string. The hash function in Bitcoin’s proof-of-work is defined as:

'The base is the hash function that hashes to a single value' (256 bits in Bitcoin)./..

In the relationship between the complexity of hashing & the security of proof-of-work systems, there’s a direct relationship as hashing complexity increases there’s a corresponding decrease in the security of proof-of-work systems as we increase the difficulty of finding a 'nonce' that produces the desired hash. So the relationship between hashing complexity & the security of proof-of-work systems is actually 'sub-linear', not linear./..

#Bitcoin & the 'sublinear complexity of hashing'! 🧵

#Bitcoin’s hash function is a random oracle & the security of a random oracle scheme is 'sub-linear' in the number of invocations. The proof-of-work scheme in Bitcoin, on the other hand, is a 'one-way' function, producing a single fixed value output for a given input. The security of proof-of-work is therefore 'linear' in the number of invocations as we increase 'hashing complexity'./..

Miners don’t totally control #Bitcoin, they just emit blocks, batch transactions & publish them to the timechain validation; While nodes verify them, broadcast & relay transactions to other nodes & miners. So, are all randomly susceptible to several attacks!

We should work every day to make the ‘timechain’ more robust…

https://erebus-attack.comp.nus.edu.sg/erebus-attack.pdf

Always for noobs!

Being a #Nostr user is accepting to be a ‘hacker’, either a ‘programmer’, or a ‘code’ analyst, or everything! Let’s say that years ago, many of us were failures or noobs now they’re'unmissable' {they can’t fail}!

🕯️⛏️🗄️🐉🪙🟣

https://youtu.be/Sk35MKtCXfQ

https://github.com/bitcoin/bitcoin/issues/17326 nostr:note1hzqfvw6aw4zshr7t63nxqy2wle2r894jzpvrs7l24flmwd255vlq0tm80p

https://arxiv.org/pdf/2007.02287.pdf nostr:note1hzqfvw6aw4zshr7t63nxqy2wle2r894jzpvrs7l24flmwd255vlq0tm80p

If miner signaling seems to be abused or exploited at the expense of #Bitcoin users then User-Activated Soft Forks are a tool against malicious miners ? Moreover, if that’s the case, can we agree that ‘Ordinals’ can be at the source of a ‘sybil attack’ or even an ‘eclipse-attack’ ?

https://www.avivz.net/pubs/15/sec15-paper-heilman_final.pdf