Search content
Sort by

Showing 20 of 29 results by pwn8
Post
Topic
Board Development & Technical Discussion
Re: replacement for pow
by
pwn8
on 21/04/2023, 01:20:40 UTC
it will cost everyone's trust. the more nodes, the more difficult it is to attack this network of trust. maybe we can remove the ban feature
Post
Topic
Board Development & Technical Discussion
Re: replacement for pow
by
pwn8
on 21/04/2023, 00:12:23 UTC
xrp is very centralized. we need a web of trust cryptocurrency governed by a community.
With the mechanism I created we were able to prevent the sybil attack because to create a node you need 51% of the votes of the already elected nodes.
More nodes the more decentralized the network is and the more difficult it is to attack.
Then we create a discord for example and accept people who prove they are not bots.
Post
Topic
Board Development & Technical Discussion
Re: replacement for pow
by
pwn8
on 20/04/2023, 23:20:09 UTC
I'm saying that a cryptocurrency doesn't need to be permissionless to be decentralized. we can build a web of trust concept.
Post
Topic
Board Development & Technical Discussion
Topic OP
replacement for pow
by
pwn8
on 20/04/2023, 20:27:16 UTC
Bitcoin's decentralized and permissionless nature is its biggest advantage but also its biggest weakness: it's too easy to create fake nodes.
But I believe that a permissioned and decentralized network is also possible. For a node to enter the network, a 51% approval of validators already approved in the network is required.
Then we created a community on some social network or on this forum and created a kind of web of trust  https://en.wikipedia.org/wiki/Web_of_trust.
Thus it will be possible to establish a decentralized network without energy waste. Humans are very good at identifying bots.
At the same time that it will be possible to enter the network with 51% approval, it will also be possible to ban nodes.
If anyone is interested in creating this mechanism please let us know.
Post
Topic
Board Development & Technical Discussion
Re: Proof of Space with RAM
by
pwn8
on 08/04/2023, 21:38:21 UTC
We can use cuckoo cycle but instead of increasing the difficulty like in hashcash we increase the amount of memory required. Being asics resistant by design.
Post
Topic
Board Development & Technical Discussion
Re: Proof of Space with RAM
by
pwn8
on 08/04/2023, 20:16:01 UTC
cpu can have multiple cores. ram memory can have variable speeds but it is very little difference. high end ram memory does not have as much advantage compared to a high end cpu.

if a proof of ram coin enters the market it is only a matter of time for decentralization. we could say the same with bitcoin in 2009 because amazon had big servers.
Post
Topic
Board Development & Technical Discussion
Re: Proof of Space with RAM
by
pwn8
on 08/04/2023, 19:38:31 UTC
ram memory is much more accessible and "equal" than cpu and then asics.
Post
Topic
Board Development & Technical Discussion
Re: Proof of Space with RAM
by
pwn8
on 08/04/2023, 19:32:04 UTC
As I understood more RAM does not increase the chance of winning in cuckoo cycle is it possible to adapt this algorithm to do this? to make a proof of RAM algorithm?Maybe run several times in parallel?

Post
Topic
Board Development & Technical Discussion
Re: Proof of Space with RAM
by
pwn8
on 08/04/2023, 00:07:10 UTC
only if you turn off your computer idiot
Post
Topic
Board Development & Technical Discussion
Re: Proof of Space with RAM
by
pwn8
on 07/04/2023, 23:58:35 UTC
i am thinking of just storing hashes in memory and the winner is the hash that is closest to the hash of the previous block.
an attacker can just recalculate the hashes like in conventional pow but in the long run storing the hashes will give an advantage.
if the miner doesn't have a valid hash he can start calculating other hashes with the CPU.
it is like a proof of work and memory.
Post
Topic
Board Development & Technical Discussion
Re: Proof of Space with RAM
by
pwn8
on 07/04/2023, 20:31:18 UTC
you don't understand. i am not saying to store the blockchain in RAM. i am saying to replace the proof of work with a proof of space that is in RAM
Post
Topic
Board Development & Technical Discussion
Topic OP
Proof of Space with RAM
by
pwn8
on 07/04/2023, 20:07:15 UTC
is it possible to make a proof of space that is stored entirely in RAM?
 in my opinion proof of space has failed because storing in hard drives is not practical and ends the useful life of the hard drive.
If there is a way to have the voting power based on ram memory, in my opinion,
it would be fairer than proof of work.
I am thinking of storing proofs of work in RAM in such a way that they do not expire with a new block being created.
For example, hash of random bytes needs to do a partial hash collision of the previous block.
Then we fill the ram with proofs of work
If no miner has the hash needed to make the collision we gradually decrease the difficulty until one miner wins the lottery to prevent the miner from generating new pows.
RAM is much more energy efficient than cpu and does not damage as easily as hard disks.
Post
Topic
Board Development & Technical Discussion
Re: achieve sybil attack resistance using an existing distributed asset: domain name
by
pwn8
on 03/04/2023, 21:47:38 UTC
the amount of coins would not be infinite.
it is the same in proof of work more computing power does not mean printing more coins
Post
Topic
Board Development & Technical Discussion
Re: achieve sybil attack resistance using an existing distributed asset: domain name
by
pwn8
on 02/04/2023, 20:25:07 UTC
If a node loses access, it will not be possible to communicate with the rest of the network.
Do you really think that icann will ban all domain names to "control" the network?
 It is the same logic as proof of work. it is assumed that the majority is honest.
If proof of stake is possible using an asset from the network itself, why wouldn't it be possible to use an asset from outside the network?
Post
Topic
Board Development & Technical Discussion
Re: achieve sybil attack resistance using an existing distributed asset: domain name
by
pwn8
on 02/04/2023, 01:07:24 UTC
just limit the tld to .com and a few others
Post
Topic
Board Development & Technical Discussion
Re: achieve sybil attack resistance using an existing distributed asset: domain name
by
pwn8
on 31/03/2023, 03:00:49 UTC
nothing. nobody has implemented this idea before because maybe it is not "decentralized" enough.
That is the idea, more domains more voting power.
Proof-of-domain system.
If any programmer is interested in building an energy efficient cryptocurrency, in line with the idea of the internet, and more decentralized than the proof-of-stake mechanisms please give us feedback
Post
Topic
Board Development & Technical Discussion
Topic OP
achieve sybil attack resistance using an existing distributed asset: domain name
by
pwn8
on 31/03/2023, 01:39:12 UTC
The idea is simple. 
Each node must have a valid domain name.
A node is randomly selected to mine a block.
Using an internet asset to create a decentralized and energy efficient cryptocurrency.
Post
Topic
Board Development & Technical Discussion
Re: one ip one vote
by
pwn8
on 31/03/2023, 00:06:12 UTC
How about using domain names as proof of stake? I think it is perfectly possible.
maybe not as decentralized as proof of work but certainly more decentralized than proof of stake because the coins are not created all at once.
we use an internet asset to create an internet coin.
Post
Topic
Board Development & Technical Discussion
Re: one ip one vote
by
pwn8
on 20/02/2023, 21:53:36 UTC
I think it's possible with ipv4 addresses.
a cryptocurrency cannot be more decentralized than the internet itself.
Post
Topic
Board Development & Technical Discussion
Merits 1 from 1 user
Topic OP
one ip one vote
by
pwn8
on 20/02/2023, 16:34:50 UTC
⭐ Merited by Welsh (1)
the bitcoin white paper says: "if the majority were based on one-IP-address-one-vote, it could be subverted by anyone
able to allocate many IPs".
Is it possible to create a cryptocurrency in which IP addresses are "staked"?.
If a node acts maliciously its ip address is blacklisted.
So anyone with internet access can act as a validator.