Post
Topic
Board Development & Technical Discussion
Re: replacement for pow
by
Ucy
on 01/05/2023, 15:57:31 UTC
Bitcoin's decentralized and permissionless nature is its biggest advantage but also its biggest weakness: it's too easy to create fake nodes.
But I believe that a permissioned and decentralized network is also possible. For a node to enter the network, a 51% approval of validators already approved in the network is required.
Then we created a community on some social network or on this forum and created a kind of web of trust  https://en.wikipedia.org/wiki/Web_of_trust.
Thus it will be possible to establish a decentralized network without energy waste. Humans are very good at identifying bots.
At the same time that it will be possible to enter the network with 51% approval, it will also be possible to ban nodes.
If anyone is interested in creating this mechanism please let us know.


Proof of Work is the only true Consensus Mechanism for any truely Decentralized & Trustless Cryptocurrency. It currently has no better/proper replacement that I'm aware of.  And it simply means to Prove Miners Works before they are rewarded and their works accepted.
Higher price tend to attracts more workers/miners (possibly with more powerful miners to be able to keep up with mining difficulty) thus making the Network more secure against 51% attacks and increasing the energy usage.


By the way, Bitcoin is a Freedom System that isn't supposed to limit users like PoS does with stake limit, lock limit, consensus limit etc . It's dangerous to limit the freedom its features gurantee to people while trying escape or survive a tyrannical opposite system . The proper way to solve problems on the Network is to creatively build on the existing foundation/principles like on the Permissionless feature you mentioned. If you are worried about 51attack or the so called fake node, then create a decentralized identity system which anyone can easily have, then get anyone who wishes to be monitored less (or have a smooth stay on the network) probably against 51% attack to verify their identity. Miners identity information must be hidden/private and should only controlled by them. Once there is an attack from a miner or group of miners the Network can have their identities unmasked via consensus. You can also use ID scheme to build miners reputation... If you choose only reputation without ID , I think that could easily be cheated.