Milly Bitcoin [ARCHIVE] on Nostr: 📅 Original date posted:2015-07-15 📝 Original message:Below are 2 examples why a ...
📅 Original date posted:2015-07-15
📝 Original message:Below are 2 examples why a systematic risk analysis needs to be used.
The current situation is that you have developers making hyperbolic,
demonizing statements that users are "spammers" and engaged in Sybil
"attacks." Characterizing these activities as spam and Sybil attacks is
not a systematic analysis, it is closer to the process used at the Salem
Witch trials.
If this process of demonetization is to take its natural course then
these statements are "developer attacks" from a developer system that
lacks proper incentives and is rife with conflicts of interest.
Russ
>... they need to
> connect to a large % of nodes on the network; that right there is a
> sybil attack. It's an approach that uses up connection slots for the
> entire network and isn't scalable; if more than a few services were
> doing that the Bitcoin network would become significantly less reliable,
> at some point collapsing entirely.
...
> Spammers out there are being very disrepectful of my fullnode resources
Published at
2023-06-07 15:42:22Event JSON
{
"id": "f28261ba51e43110f70d67a842f5593cca0cf1709e8230c8e9298123cd1ad998",
"pubkey": "1b29d94ee81e1ee0479f1db4bc4ac887407bd470a0d7060e76f8ab27fdd57e50",
"created_at": 1686152542,
"kind": 1,
"tags": [
[
"e",
"8cfdb6ed676e52875cd3360f4e3b9fd8a9125080a56694ae91a3defb5a52e9fc",
"",
"root"
],
[
"e",
"abe8feafa62244ac29a1eda3358f3af93fa8aa335143e63bbf46f308220bb722",
"",
"reply"
],
[
"p",
"674837a61b71bdeceed4c8bd63a7b0bcc093eed02ec2beee7acd69965f15700d"
]
],
"content": "📅 Original date posted:2015-07-15\n📝 Original message:Below are 2 examples why a systematic risk analysis needs to be used. \nThe current situation is that you have developers making hyperbolic, \ndemonizing statements that users are \"spammers\" and engaged in Sybil \n\"attacks.\" Characterizing these activities as spam and Sybil attacks is \nnot a systematic analysis, it is closer to the process used at the Salem \nWitch trials.\n\nIf this process of demonetization is to take its natural course then \nthese statements are \"developer attacks\" from a developer system that \nlacks proper incentives and is rife with conflicts of interest.\n\nRuss\n\n\n\u003e... they need to\n\u003e connect to a large % of nodes on the network; that right there is a\n\u003e sybil attack. It's an approach that uses up connection slots for the\n\u003e entire network and isn't scalable; if more than a few services were\n\u003e doing that the Bitcoin network would become significantly less reliable,\n\u003e at some point collapsing entirely.\n\n...\n\n \u003e Spammers out there are being very disrepectful of my fullnode resources",
"sig": "d85fb882245b1a115a951fb5ad9b5a690797548737ab86ca3a6ac7ad24c635159020af837964a0c5921b417f7cc52d0f543d17b4345b704e60d4842e68ada7ca"
}