Peter Todd [ARCHIVE] on Nostr: š
Original date posted:2015-07-15 š Original message:On Wed, Jul 15, 2015 at ...
š
Original date posted:2015-07-15
š Original message:On Wed, Jul 15, 2015 at 08:49:13AM -0700, Me wrote:
> > Blockcypher's "confidence factor" model(1)
> > under the hood - yet another one of those sybil attacking network
> > monitoring things
>
>
> Peter, I noticed on your twitter you have a lot of bad things to say about Blockcypher and their business model (which I might not full agree, but totally respect), can you share any evidence they perform any form of Sybil attack on the network, please.
For Blockcypher to succesfully do what they claim to do they need to
connect to a large % of nodes on the network; that right there is a
sybil attack. It's an approach that uses up connection slots for the
entire network and isn't scalable; if more than a few services were
doing that the Bitcoin network would become significantly less reliable,
at some point collapsing entirely.
--
'peter'[:-1]@petertodd.org
0000000000000000093f699ccdb323aa638af1131249ec2e1bacbf367163807a
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 650 bytes
Desc: Digital signature
URL: <
http://lists.linuxfoundation.org/pipermail/bitcoin-dev/attachments/20150715/286e3fda/attachment.sig>
Published at
2023-06-07 15:42:21Event JSON
{
"id": "5aec87b6cbd28f39d376359ef18e60e3f08913ace6a9691cbbab604a116d94b0",
"pubkey": "daa2fc676a25e3b5b45644540bcbd1e1168b111427cd0e3cf19c56194fb231aa",
"created_at": 1686152541,
"kind": 1,
"tags": [
[
"e",
"8cfdb6ed676e52875cd3360f4e3b9fd8a9125080a56694ae91a3defb5a52e9fc",
"",
"root"
],
[
"e",
"6c53d8fa2e1254a79809a502396fef5c68faaeebf3a29035577cf39d5116713b",
"",
"reply"
],
[
"p",
"410fe5be988d9f9e9acfa8af5dd7599db2206cd26cd037c7d1bbc1f84e467433"
]
],
"content": "š
Original date posted:2015-07-15\nš Original message:On Wed, Jul 15, 2015 at 08:49:13AM -0700, Me wrote:\n\u003e \u003e Blockcypher's \"confidence factor\" model(1)\n\u003e \u003e under the hood - yet another one of those sybil attacking network\n\u003e \u003e monitoring things\n\u003e \n\u003e \n\u003e Peter, I noticed on your twitter you have a lot of bad things to say about Blockcypher and their business model (which I might not full agree, but totally respect), can you share any evidence they perform any form of Sybil attack on the network, please. \n\nFor Blockcypher to succesfully do what they claim to do they need to\nconnect to a large % of nodes on the network; that right there is a\nsybil attack. It's an approach that uses up connection slots for the\nentire network and isn't scalable; if more than a few services were\ndoing that the Bitcoin network would become significantly less reliable,\nat some point collapsing entirely.\n\n-- \n'peter'[:-1]@petertodd.org\n0000000000000000093f699ccdb323aa638af1131249ec2e1bacbf367163807a\n-------------- next part --------------\nA non-text attachment was scrubbed...\nName: signature.asc\nType: application/pgp-signature\nSize: 650 bytes\nDesc: Digital signature\nURL: \u003chttp://lists.linuxfoundation.org/pipermail/bitcoin-dev/attachments/20150715/286e3fda/attachment.sig\u003e",
"sig": "432f7fd2a56c8978ddc59b10a18985aff0d1ed816598f72fce660421938b83ee60080c302bc200ea83e5f6a30a9db0e67baaa09ea3142ecb0968c74191ea108a"
}