Troy Benjegerdes [ARCHIVE] on Nostr: 📅 Original date posted:2015-02-15 📝 Original message:On Thu, Feb 12, 2015 at ...
📅 Original date posted:2015-02-15
📝 Original message:On Thu, Feb 12, 2015 at 09:27:22AM +0100, Tamas Blummer wrote:
>
>
> On Feb 12, 2015, at 9:16 AM, Alex Mizrahi <alex.mizrahi at gmail.com> wrote:
> > Why don't you use getrawmempool RPC call to synchronize mempool contents?
>
>
>
> Since RPC interface does not scale to serve a multi user service.
> In absence of better alternative, the interfaces used by a proprietary extension are usually the same as in P2P consensus.
>
> POW is used to figure the longest chain and until now broadcasted transactions were assumed the one and only.
> These simple rules ensure a consensus between the proprietary stack and the border router, and that is the consensus I referred to.
>
If a proprietary stack has problems with replace-by-fee then it's probably
succeptible to malicious attack because an attacker could just broadcast
one transaction to the network and then replace it when they are able to
mine a block themselves.
>
> On Feb 12, 2015, at 8:45 AM, Peter Todd <pete at petertodd.org> wrote:
> > IOW, assume every transaction your "border router" gives you is now the
> > one and only true transaction, and everything conflicting with it must
> > go.
>
>
> You are right that the assumption about the one and only transaction have to be relaxed. Broadcasting
> double spend only if it is actually replacing an earlier - for whatever reason, would simplify internal consensus logic .
>
Published at
2023-06-07 15:30:08Event JSON
{
"id": "52d8c1b77af716e6cee8c3771114e896bbee74ce9a697915fec72143c5978226",
"pubkey": "de834b230daa8e6d04c44e51929c52dfdc36dc2f4105a0b67060d9dfc30d6ccc",
"created_at": 1686151808,
"kind": 1,
"tags": [
[
"e",
"ba772dbf5c965827fc712af37e2abb78447348cb2e1023b6358796cc65e7b8fb",
"",
"root"
],
[
"e",
"33dca33887ce99772a34c36911bd00ddbd0529f001dba4ba25fbf6fc0602550e",
"",
"reply"
],
[
"p",
"c632841665fccdabf021322b1d969539c9c1f829ceed38844fea24e8512962d7"
]
],
"content": "📅 Original date posted:2015-02-15\n📝 Original message:On Thu, Feb 12, 2015 at 09:27:22AM +0100, Tamas Blummer wrote:\n\u003e \n\u003e \n\u003e On Feb 12, 2015, at 9:16 AM, Alex Mizrahi \u003calex.mizrahi at gmail.com\u003e wrote:\n\u003e \u003e Why don't you use getrawmempool RPC call to synchronize mempool contents?\n\u003e \n\u003e \n\u003e \n\u003e Since RPC interface does not scale to serve a multi user service.\n\u003e In absence of better alternative, the interfaces used by a proprietary extension are usually the same as in P2P consensus.\n\u003e \n\u003e POW is used to figure the longest chain and until now broadcasted transactions were assumed the one and only. \n\u003e These simple rules ensure a consensus between the proprietary stack and the border router, and that is the consensus I referred to.\n\u003e \n\nIf a proprietary stack has problems with replace-by-fee then it's probably \nsucceptible to malicious attack because an attacker could just broadcast\none transaction to the network and then replace it when they are able to\nmine a block themselves.\n\n\u003e \n\u003e On Feb 12, 2015, at 8:45 AM, Peter Todd \u003cpete at petertodd.org\u003e wrote:\n\u003e \u003e IOW, assume every transaction your \"border router\" gives you is now the\n\u003e \u003e one and only true transaction, and everything conflicting with it must\n\u003e \u003e go.\n\u003e \n\u003e \n\u003e You are right that the assumption about the one and only transaction have to be relaxed. Broadcasting \n\u003e double spend only if it is actually replacing an earlier - for whatever reason, would simplify internal consensus logic .\n\u003e",
"sig": "454f5d4482c54c29dc67c8ceb3d43e2db54e82b9f5bf032e3fa4f8e62b4cb31f25e6200cc803a759f1d04158c9e946c84aae49c3e44d1572d1a0eedcc4d4e6fd"
}