[bitcoin-dev] Malice Reactive Proof of Work Additions (MR POWA): Protecting Bitcoin from malicious miners

Erik Aronesty erik at q32.com
Mon Apr 17 07:47:48 UTC 2017

On Apr 16, 2017 6:28 PM, <bfd at cock.lu> wrote:

On 2017-04-16 17:04, Erik Aronesty via bitcoin-dev wrote:

> This is a great solution.
> 8 or more secure hashes, each of which can be implemented on GPU/CPU,
> but rotate through them - per block round robin.
> Hardware, infrastructue investment is protected.  ASIC is not.
The write time for configuring a FPGA with a fresh bitstream is measured in
tens of milliseconds.

I have no objections to the use of FPGA or any other commercially available

ASIC will never beat this - because it will be 8x more expensive to
> maintain the cold circuits.
Unused circuits don't consume power, which is the main cost in running a

They make GPUs or FPGAs (as u mentioned) far more affordable.  The problem
is centralized manufacturing, which, in turn, is a side effect of a covert
hardware mining optimization leading to a monopoly.

A rotating POW seems to make ASIC manufacture impractical compared to
generalized, commercially available hardware.

It's too bad we can't make the POW somehow dynamic so that any specialized
hardware is impossible, and only GPU / FPGA is possible.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.linuxfoundation.org/pipermail/bitcoin-dev/attachments/20170417/f1e21176/attachment.html>

More information about the bitcoin-dev mailing list