Bitcoin

Attacks – How might pool-resistant mining change the dynamics of attack states?

While researching mining centralization in Bitcoin, I discovered Wowero’s dedicated pool resistance for solo mining. As shown in miningpoolstats.stream, Pool Mining Wowero does not seem to exist.

Woownero’s idea of ​​pull resistance gained so much traction that

One. Bitcoin users upgrade to a hard fork that requires all mining clients to provide the following arguments: --receive-address YOUR-ADDRESS --secret-key SECRET-SPENDKEY Make Bitcoin pull resistant to start mining

2. Bitcoin users upgrade to the same hard fork. One However, users change the mining algorithm to anti-ASIC RandomX.

In some of these cases, states are now moving to the competitive stage and attempting to secure most of the hashing power for censorship. If the One The state does this by operating tax-subsidized ASIC farms. The state initially seizes ASICS from existing miners, purchases ASICS on the free market, and eventually also subsidizes ASICS production. If the 2 Some states may force their citizens to use distributions for desktop computers, such as Deepin, which come with mining software that has government receiving addresses and corresponding private keys hardcoded into them. The mining process on these computers can be tailored to user activity. For example, a script running in the background on a laptop detects whether the power cable is connected. The mining software will only start mining when there is no battery power. public discontent and loss of productivity). Desktop PCs rather than laptops will probably need to run more aggressive mining tasks. In the West, governments can force enterprise operating system vendors to include pre-installed miners, proprietary systems (Windows, Apple), or free systems as in the case of PopOS.

In both cases, the proceeds from mining (Coinbase transactions and some white market transaction fees if you do not choose empty block mining) are used to further subsidize the attacks in the attacking state. This isn’t always the case. If the One Some operators of ASIC farms steal the profits. States may try to respond by offering financial incentives to honest mining farm operators. If the 2 Any computer-savvy individual can send these Bitcoins to themselves.

My questions:

One. How will Bitcoin’s attack surface change if: One and 2? What other attack strategies are there that I haven’t described?

2. How does this change the security of Bitcoin holdings against non-attacking black market miners? Now anyone with enough access to your PC to run “ps aux|grep -i bitcoind” can obtain your private key. They can use the same wallet for mining and spending to save on transaction fees.

three. Considering the high volatility of rewards from solo mining due to Bitcoin’s low block rate, coins like Kaspa have a high (1-10 per second) block emission rate and have an advantage as black market currencies due to their low delivery capacity. What are the differences in rewards for miners?

4. What did I miss in my analysis?

Related Articles

Back to top button