Post
Topic
Board Announcements (Altcoins)
Re: BiblePay - New Coin Launch - Official Thread
by
togoshigekata
on 26/12/2017, 03:15:59 UTC
an interesting project, is algo asic and gpu resistant? are there any independent miners workers anywhere without wallets? hmmm

just calling your hash bible hash does not make the hash special ...
are y'all really claiming to use an original hash?
can anybody (smarter than me at understanding all this) verify that it is an entirely unique algorithm? thanks!

Ive been asked a similar question in another thread,
I know the White Paper and Source Code is what youd want to look at,
but I do not know enough about cryptocurrency algorithms to answer:

BiblePay White Paper: http://pool.biblepay.org/Docs/BiblePay_White_Paper.pdf

BiblePay Source Code: https://github.com/biblepay/biblepay

With my limited understanding BiblePay is ASIC Resistant with Proof of Biblehash Algorithm (POBh),
How could we go about verifying this through a 3rd party? Ive seen at least 3 people skeptical so far.


Why don't we offer a 250,000 BBP reward to hack it?  If one can port proof-of-biblehash to a GPU or an ASIC, and obtain a mining "edge" of more than 20% over a CPU, they win the 250,000 BBP reward.


EDIT: The proof-of-biblehash is unique, its the only one that uses the bible verses to create a hash.  Additionally, our blockhash is unique in the sense that Groestl has been ported to "biblepay.c", which is a transmuted algorithm (it no longer shares the seeds of groestl).

Love it! Great idea! What would be a good way to go about this?

===

I guess it depends on who digs into this, I assume some people out there have probably already tried to analyze the algorithm to break it.
If I were more blackhat vs whitehat, If I found an exploit, Id keep it to myself and take advantage of it.

(My limited understanding, not sure if its true, reminds me of one the mega Bitcoin mining companies,
 that didnt want to update with SegWit because they had ASICBoost, which gave them 20% gains, I think they even patented it)

===

I remember reading about Monero's (XMR) bug/hack bounty:

https://hackerone.com/monero
https://github.com/monero-project/meta/blob/master/VULNERABILITY_RESPONSE_PROCESS.md

===

Ill make a Reddit post about this with some quick research and add it to TODO list and sidebar