mikehearn-nypr

Untitled

Mar 14th, 2014
1,397
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.03 KB | None | 0 0
  1. From [email protected] Tue Jan 13 07:55:20 2009
  2. Return-Path: <[email protected]>
  3. Delivered-To: [email protected]
  4. Received: (qmail 27444 invoked from network); 13 Jan 2009 07:55:20 -0000
  5. Received: from anonymousspeech.com (HELO mail.anonymousspeech.com)
  6. (124.217.253.42) by oaklabs.net with SMTP; 13 Jan 2009 07:55:20 -0000
  7. Received: from server123 ([124.217.253.42]) by anonymousspeech.com with
  8. MailEnable ESMTP; Tue, 13 Jan 2009 15:55:13 +0800
  9. MIME-Version: 1.0
  10. Date: Tue, 13 Jan 2009 15:39:31 +0800
  11. X-Mailer: Chilkat Software Inc (http://www.chilkatsoft.com)
  12. X-Priority: 3 (Normal)
  13. Subject: Re: Bitcoin v0.1 released
  14. Content-Type: text/plain
  15. From: "Satoshi Nakamoto" <[email protected]>
  16. Message-ID: <CHILKAT-MID-4796e86e-a686-4a4b-2438-8bec9d82ecfe@server123>
  17. X-Evolution-Source: pop://[email protected]/
  18. Content-Transfer-Encoding: 8bit
  19.  
  20. > It actually posts the hash blocks to a Google Group called
  21. > 'proof-hashes', so similar result as if it were posting to Usenet.
  22. >
  23. > http://groups.google.com/group/proof-hashes
  24. >
  25. > Since I run that group, and it's sole purpose is to archive
  26. > proof-of-work hashes, feel free to join an account to have your system
  27. > post there as well if you like.
  28.  
  29. Sweet, I was looking for a group like that on Usenet at one point to see
  30. what I would use if I needed, and nothing really fit. I'm sure Google
  31. groups is a lot easier to post to.
  32.  
  33. There are some scenarios where a Usenet or Google group could be used as
  34. a supplemental defence. Bitcoin is at its most vulnerable in the
  35. beginning when the total network CPU power is small. That's offset by
  36. the fact that the incentive to attack it is also low when it's small.
  37. Hopefully the easy solution of just growing up and getting past that
  38. stage will work. If not, there are ways a Google group could help, if
  39. it really came to that.
  40.  
  41.  
  42. > Electronic currency and cryptography are two things that I am very
  43. > interested in so as you would assume I was drawn to this project
  44. > immediately when I saw it posted to the Cryptography email list. Feel
  45. > free to ping me for feedback or to test out new features, I'll be happy
  46. > to help out.
  47.  
  48. We definitely have similar interests!
  49.  
  50. You know, I think there were a lot more people interested in the 90's,
  51. but after more than a decade of failed Trusted Third Party based systems
  52. (Digicash, etc), they see it as a lost cause. I hope they can make the
  53. distinction, that this is the first time I know of that we're trying a
  54. non-trust based system.
  55.  
  56.  
  57. > When the
  58. > coins mature, will that generate a new 'credit' transaction, or will the
  59. > existing generation transaction line's credit field be updated?
  60.  
  61. The existing transaction line will change.
  62.  
  63.  
  64. > Upon opening version 0.1.3, all four of my transaction entries still say
  65. > 'unconfirmed', but now the Descriptions say 'Generated (not accepted)'.
  66. > Does this mean that some other node had extended the chain first and my
  67. > coins were generated in a dead branch? If so, why did the previous
  68. > instance of the software not detect this immediately and begin
  69. > generating coins in the winning branch? Bug in 0.1.0?
  70.  
  71. You're right, sorry about that. It's the bug that was fixed in 0.1.3.
  72. The communications thread would get blocked, so you would make
  73. connections, but they would go silent after a while. When you found a
  74. block, you couldn't broadcast it to the network, so it didn't get into
  75. the chain. You weren't receiving anything either to know that the
  76. network had gone on without you, until you restarted it.
  77.  
  78. The bug is also what caused bitcoin.exe to fail to exit. The
  79. communications thread was blocked and failed to exit. Bitcoin does a
  80. careful shutdown in case it might be in the middle of an important
  81. transaction, but actually it's completely safe to kill it.
  82.  
  83. This is all fixed in 0.1.3. If you give me your IP, I'll send you some
  84. coins.
  85.  
  86.  
  87. > One other question I had... What prevents the single node with the most
  88. > CPU power from generating and retaining the majority of the BitCoins?
  89. > If every node is working independently of all others, if one is
  90. > significantly more powerful than the others, isn't it probable that this
  91. > node will reach the proper conclusion before other nodes? An
  92. > underpowered node may get lucky once in a while, but if they are at a
  93. > significant horsepower advantage I would expect the majority of BitCoins
  94. > to be generated by the most powerful node.
  95.  
  96. It's not like a race where if one car is twice as fast, it'll always
  97. win. It's an SHA-256 that takes less than a microsecond, and each guess
  98. has an independent chance of success. Each computer's chance of finding
  99. a hash collision is linearly proportional to it's CPU power. A computer
  100. that's half as fast would get half as many coins.
  101.  
  102.  
  103. > I'll watch this instance and see how it goes...
  104.  
  105. Let me know how it goes. If you have any trouble with it, send me your
  106. debug.log file. I can often figure out what went wrong just from that.
  107.  
  108. Satoshi
Advertisement
Add Comment
Please, Sign In to add comment