Primordialš¦ on Nostr: The protocol is working exactly as Satoshi designed it. He decentralized control ...
The protocol is working exactly as Satoshi designed it. He decentralized control authority of block writing to those who display the most computational power.
If you are worried about potential censorship, I suggest you summon up some watts and enter the physical power competition.
The largest mining pools were inevitably going to organizations similar to NATO and BRICS. This aligns with the way human evolution is playing out at a systemic biological level. Pure game theory. But it's important to realize that the incentive structure results in mutually assured preservation of access to the system. Not degrading access to the system even for adversaries.
Published at
2025-03-29 18:29:23Event JSON
{
"id": "576e26d2b19ebadd53269f0fce2efbcee3e04ce54b5e9fa6ae8f6ac86f1e7bfb",
"pubkey": "335598caef49b1b45302ea016856a856faf56588e7e15fed03c4954cb843d0a7",
"created_at": 1743272963,
"kind": 1,
"tags": [
[
"e",
"6a551ce901232394feb7ee821a08d62c5a28515bffd22207b4e64d2037360770",
"",
"root"
],
[
"e",
"882607491c3b757c03f55d80faafa40b161ff7d731ba8e530c8a0e8897d5fc74"
],
[
"e",
"25acc9d86790c97180b1e3595fca6eaf982c7fbbdfceecc2a08d98c51635090e",
"",
"reply"
],
[
"p",
"6cc4225f7970c56b9f4a1784a85ddbbde97599e365ba8c864a4d9105942b7222"
],
[
"p",
"335598caef49b1b45302ea016856a856faf56588e7e15fed03c4954cb843d0a7"
],
[
"p",
"45f195cffcb8c9724efc248f0507a2fb65b579dfabe7cd35398598163cab7627"
]
],
"content": "The protocol is working exactly as Satoshi designed it. He decentralized control authority of block writing to those who display the most computational power.\n\nIf you are worried about potential censorship, I suggest you summon up some watts and enter the physical power competition.\n\nThe largest mining pools were inevitably going to organizations similar to NATO and BRICS. This aligns with the way human evolution is playing out at a systemic biological level. Pure game theory. But it's important to realize that the incentive structure results in mutually assured preservation of access to the system. Not degrading access to the system even for adversaries.",
"sig": "b5db6eec5fcda932ce9e8a4a0a52d90922478a238acb25c8937e0cf2839bdaa8cc7b5affd04f56daad481c33809cb1a7157b17f3aa96e0d66846d05a51bedc95"
}