Centralized cryptocurrency exchanges are under. meaning all of the data and information exists in.And the last time you debated me, I defeated you on every single point.I was just starting treatment for fatty liver disease over the past 2 days (along with running around getting a diagnosis and other foggy brain matters) so apologies that only this morning did I feel alert enough to write a coherent explanation such as this.I think this is the most promising direction that still remains for me.
Digital tokens are being used in cryptocurrency markets toThe chosen nodes are ever changing in very short time windows (minutes) and are not static.It could be that the DE for low security coins needs to be done over longer periods of time and in small increments, ie overlapped micropayment channels.This encourages the nation-states to organize into cooperation on regulation of the internet in order to regain control over money.I do not like to work on things that I feel are misdirected and destined for failure in the end.
The worst case is transaction processing halts for a few minutes until the next set of nodes are eligible and the network continues operating.
No stake holder (in any context or business model) allows a competitor to profit.After all that, I decided the only way to get a breakthrough on electronic money is to admit the CAP theorem and decide which of the three, Consistency, Access, Partitioning to forsake in a design.
First descriptions of a functional Cryptocurrency appeared around 1998, and were written by a person named Wei Dai.Mining is a process where decentralized agents compete with each other to verify blocks of transactional data.Apologies in advance to all those who have worked so hard on trying to advance crypto currency.P2P Cryptocurrency Exchanges, Explained. All advantages of decentralized cryptocurrency. it also works as the single point of failure, meaning that.Transaction fees can only be changed by committee members which are elected by stakeholder vote.
You could simultaneously short it (i.e. which you did when you borrowed the coins, but sell some for fiat before you attack) for profits.You mean either: Larger stakeholders get more (either because they can outvote the smaller ones, or because the smaller ones are somehow convinced the coin will gain more value if they give away their coins).Bitcoin was introduced on 31 October 2008 to a cryptography mailing list, and released as open-source software in 2009.Quote from: jl777 on February 25, 2016, 08:21:06 AM Only specific failure cases, which can then be generalized and solutions usually devised.For cryptocurrency supporters, this anonymity is a primary strength of this technology, despite the potential for illegal abuse, as it enables a shift in power from institutions to individuals.I know that if I just say, sure in theory it wont work and dont push for a solution, then it would limit things to BTC LTC and gradually more and more, so at worst it is a slow process, but we dont have to outrun the bear, we just need to be more secure than a CE.The point is mathematical structure in that stake only has to be purchased once, whereas electricity has to be paid continuously.But an insecure or centralizing paradigm for money is not going to inspire nor enable adoption, thus like all the altcoins the price is likely to perpetually decline after the initial hype pump moonshoot and crash.
But that is not even the main point, which apparently you are also not cognisant of.Stake is not as secure as hashrate because stake is paid once for an eternal attack and hashrate must be paid continuously else the attack ends (is finite in duration).The 50% attacks have already occurred numerous times for PoS and PoW coins.
I am respectful to those who respect those who invest effort.I suppose one could social engineer their way into Ant-pools mine and covertly reflash the firmware on all the miners.But I argue we can do better than some muddled middle ground where for example Bitcoin is already controlled by a Chinese mining cartel that has 65% of the hashrate and is provably lying about the Great Firewall of China being a hindrance for them (their motivation is obviously to make higher profits with higher transaction fees by constraining block size).With PoW, your borrowed mining hashrate would eventually reach end of contract and the coin would repair itself.
There is no POW required to secure a CL (channeled ledger), nor is it a block chain, or a DAG.In the mean time an attacker has to identify who the next m voters are, locate n of them and take them out.rinse, repeat a few minutes later.The Value of Cryptocurrency Today And What The. secure storage and a decentralized public.I felt rather hopeless about this, and so spent a few days thinking about other potential directions for my life, work, etc.The common characteristics in all cryptocurrencies are the use of cryptography for security and their decentralized.
Quote from: jl777 on February 19, 2016, 01:45:51 AM Just because something is possible, that doesnt mean it is certain to happen, especially when it is economically non-viable.Even there are chosen nodes who are signatories for determining the truth of the channel, this then not permissionless because the government can attack those specific nodes.