Jeremy Spilman [ARCHIVE] on Nostr: 📅 Original date posted:2015-03-27 📝 Original message:> On Mar 27, 2015, at 8:16 ...
📅 Original date posted:2015-03-27
📝 Original message:> On Mar 27, 2015, at 8:16 AM, Matt Whitlock <bip at mattwhitlock.name> wrote:
>
> Isn't the goal of this exercise to ensure more full nodes on the network?
Basically we're talking about a form of Sybil defense and better quantifying true blockchain resiliency by proof of storage.
In this case the goal is to see if we can prove the number of distinct digital copies of the blockchain. This is actually a tricky problem because it will (always?) devolve to inferences from response timing, and we are running over a heterogenous network with heterogeneous machines.
It would be extremely impressive to achieve a reliable mechanism for discerning a local copy exists under these constraints, particularly without false positives and false negatives, and without imposing very substantial one-time encoding costs, e.g. on par with doubling the verification cost.
I think while its a difficult cost-benefit analysis, even code complexity aside, it's interesting to discuss all the same!
Simply having many unique IP addresses possibly accessing the same unique copy provides a different (if any) benefit. E.g. Tor uses IPs as a cost factor, but (until recently?) didn't even factor in things like them all being the same Class C.
Published at
2023-06-07 15:32:04Event JSON
{
"id": "40ba734951674b6e5884d21fb2f747800d838346e576a453a038820a006c3dde",
"pubkey": "7e57666cff7c86f9410d33d4d34ef3e5105395b3c74af472541dbeeb743f9de3",
"created_at": 1686151924,
"kind": 1,
"tags": [
[
"e",
"aec2e2b18209ddcfa5d1a18863a1af4d14b80da9d7f8b7d06dfabe62f3ba4546",
"",
"root"
],
[
"e",
"78e179d6a383c94283f024e8faa3bc534b6e27e5ca233d7441bd815a0ea02181",
"",
"reply"
],
[
"p",
"5ea1cbeab9d50021496bba53fd43b1c7501d58bc84cd506595942424f8dc69c3"
]
],
"content": "📅 Original date posted:2015-03-27\n📝 Original message:\u003e On Mar 27, 2015, at 8:16 AM, Matt Whitlock \u003cbip at mattwhitlock.name\u003e wrote:\n\u003e \n\u003e Isn't the goal of this exercise to ensure more full nodes on the network?\n\nBasically we're talking about a form of Sybil defense and better quantifying true blockchain resiliency by proof of storage.\n\nIn this case the goal is to see if we can prove the number of distinct digital copies of the blockchain. This is actually a tricky problem because it will (always?) devolve to inferences from response timing, and we are running over a heterogenous network with heterogeneous machines.\n\nIt would be extremely impressive to achieve a reliable mechanism for discerning a local copy exists under these constraints, particularly without false positives and false negatives, and without imposing very substantial one-time encoding costs, e.g. on par with doubling the verification cost. \n\nI think while its a difficult cost-benefit analysis, even code complexity aside, it's interesting to discuss all the same!\n\nSimply having many unique IP addresses possibly accessing the same unique copy provides a different (if any) benefit. E.g. Tor uses IPs as a cost factor, but (until recently?) didn't even factor in things like them all being the same Class C.",
"sig": "fdfd5a1aa07ef78d68eadc2e2ed44a1179a089ae299690b348a3ad65479acc7e1a5236a43903b29fa36e26b430c29e6bca512c9641bc77dd350141602dd3cf0f"
}