Bitcoin Vs Litecoin Vs Namecoin - Tu Norte Turistico

Merged Mining: Analysis of Effects and Implications

Date: 2017-08-24
Author(s): Alexei Zamyatin, Edgar Weippl

Link to Paper


Abstract
Merged mining refers to the concept of mining more than one cryptocurrency without necessitating additional proof-of-work effort. Merged mining was introduced in 2011 as a boostrapping mechanism for new cryptocurrencies and countermeasures against the fragmentation of mining power across competing systems. Although merged mining has already been adopted by a number of cryptocurrencies, to this date little is known about the effects and implications.
In this thesis, we shed light on this topic area by performing a comprehensive analysis of merged mining in practice. As part of this analysis, we present a block attribution scheme for mining pools to assist in the evaluation of mining centralization. Our findings disclose that mining pools in merge-mined cryptocurrencies have operated at the edge of, and even beyond, the security guarantees offered by the underlying Nakamoto consensus for extended periods. We discuss the implications and security considerations for these cryptocurrencies and the mining ecosystem as a whole, and link our findings to the intended effects of merged mining.

Bibliography
[1] Coinmarketcap. http://coinmarketcap.com/. Accessed 2017-09-28.
[2] P2pool. http://p2pool.org/. Accessed: 2017-05-10.
[3] M. Ali, J. Nelson, R. Shea, and M. J. Freedman. Blockstack: Design and implementation of a global naming system with blockchains. http://www.the-blockchain.com/docs/BlockstackDesignandImplementationofaGlobalNamingSystem.pdf, 2016. Accessed: 2016-03-29.
[4] G. Andersen. Comment in "faster blocks vs bigger blocks". https://bitcointalk.org/index.php?topic=673415.msg7658481#msg7658481, 2014. Accessed: 2017-05-10.
[5] G. Andersen. [bitcoin-dev] weak block thoughts... https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2015-Septembe011157.html, 2015. Accessed: 2017-05-10.
[6] L. Anderson, R. Holz, A. Ponomarev, P. Rimba, and I. Weber. New kids on the block: an analysis of modern blockchains. http://arxiv.org/pdf/1606.06530.pdf, 2016. Accessed: 2016-07-04.
[7] E. Androulaki, S. Capkun, and G. O. Karame. Two bitcoins at the price of one? double-spending attacks on fast payments in bitcoin. In CCS, 2012.
[8] A. Back, M. Corallo, L. Dashjr, M. Friedenbach, G. Maxwell, A. Miller, A. Poelstra, J. Timón, and P. Wuille. Enabling blockchain innovations with pegged sidechains. http://newspaper23.com/ripped/2014/11/http-_____-___-_www___-blockstream___-com__-_sidechains.pdf, 2014. Accessed: 2017-09-28.
[9] A. Back et al. Hashcash - a denial of service counter-measure. http://www.hashcash.org/papers/hashcash.pdf, 2002. Accessed: 2017-09-28.
[10] S. Barber, X. Boyen, E. Shi, and E. Uzun. Bitter to better - how to make bitcoin a better currency. In Financial cryptography and data security, pages 399–414. Springer, 2012.
[11] J. Becker, D. Breuker, T. Heide, J. Holler, H. P. Rauer, and R. Böhme. Can we afford integrity by proof-of-work? scenarios inspired by the bitcoin currency. In WEIS. Springer, 2012.
[12] I. Bentov, R. Pass, and E. Shi. Snow white: Provably secure proofs of stake. https://eprint.iacr.org/2016/919.pdf, 2016. Accessed: 2017-09-28.
[13] Bitcoin Community. Bitcoin developer guide- transaction data. https://bitcoin.org/en/developer-guide#term-merkle-tree. Accessed: 2017-06-05.
[14] Bitcoin Community. Bitcoin protocol documentation - merkle trees. https://en.bitcoin.it/wiki/Protocol_documentation#Merkle_Trees. Accessed: 2017-06-05.
[15] Bitcoin community. Bitcoin protocol rules. https://en.bitcoin.it/wiki/Protocol_rules. Accessed: 2017-08-22.
[16] V. Buterin. Chain interoperability. Technical report, Tech. rep. 1. R3CEV, 2016.
[17] W. Dai. bmoney. http://www.weidai.com/bmoney.txt, 1998. Accessed: 2017-09-28.
[18] C. Decker and R. Wattenhofer. Information propagation in the bitcoin network. In Peer-to-Peer Computing (P2P), 2013 IEEE Thirteenth International Conference on, pages 1–10. IEEE, 2013.
[19] C. Decker and R. Wattenhofer. Bitcoin transaction malleability and mtgox. In Computer Security-ESORICS 2014, pages 313–326. Springer, 2014.
[20] Dogecoin community. Dogecoin reference implementation. https://github.com/dogecoin/
[27] A. Gervais, G. Karame, S. Capkun, and V. Capkun. Is bitcoin a decentralized currency? volume 12, pages 54–60, 2014.
[28] A. Gervais, G. O. Karame, K. Wüst, V. Glykantzis, H. Ritzdorf, and S. Capkun. On the security and performance of proof of work blockchains. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pages 3–16. ACM, 2016.
[29] I. Giechaskiel, C. Cremers, and K. B. Rasmussen. On bitcoin security in the presence of broken cryptographic primitives. In European Symposium on Research in Computer Security (ESORICS), September 2016.
[30] J. Göbel, H. P. Keeler, A. E. Krzesinski, and P. G. Taylor. Bitcoin blockchain dynamics: The selfish-mine strategy in the presence of propagation delay. Performance Evaluation, 104:23–41, 2016.
[31] E. Heilman, A. Kendler, A. Zohar, and S. Goldberg. Eclipse attacks on bitcoin’s peer-to-peer network. In 24th USENIX Security Symposium (USENIX Security 15), pages 129–144, 2015.
[32] Huntercoin developers. Huntercoin reference implementation. https://github.com/chronokings/huntercoin. Accessed: 2017-06-05.
[33] B. Jakobsson and A. Juels. Proofs of work and bread pudding protocols, Apr. 8 2008. US Patent 7,356,696; Accessed: 2017-06-05.
[34] M. Jakobsson and A. Juels. Proofs of work and bread pudding protocols. In Secure Information Networks, pages 258–272. Springer, 1999.
[35] A. Judmayer, N. Stifter, K. Krombholz, and E. Weippl. Blocks and chains: Introduction to bitcoin, cryptocurrencies, and their consensus mechanisms. Synthesis Lectures on Information Security, Privacy, & Trust, 9(1):1–123, 2017.
[36] A. Juels and J. G. Brainard. Client puzzles: A cryptographic countermeasure against connection depletion attacks. In NDSS, volume 99, pages 151–165, 1999.
[37] A. Juels and B. S. Kaliski Jr. Pors: Proofs of retrievability for large files. In Proceedings of the 14th ACM conference on Computer and communications security, pages 584–597. Acm, 2007.
[38] H. Kalodner, M. Carlsten, P. Ellenbogen, J. Bonneau, and A. Narayanan. An empirical study of namecoin and lessons for decentralized namespace design. In WEIS, 2015.
[39] G. O. Karame, E. Androulaki, and S. Capkun. Double-spending fast payments in bitcoin. In Proceedings of the 2012 ACM conference on Computer and communications security, pages 906–917. ACM, 2012.
[40] G. O. Karame, E. Androulaki, M. Roeschlin, A. Gervais, and S. Čapkun. Misbehavior in bitcoin: A study of double-spending and accountability. volume 18, page 2. ACM, 2015.
[41] A. Kiayias, A. Russell, B. David, and R. Oliynykov. Ouroboros: A provably secure proof-of-stake blockchain protocol. In Annual International Cryptology Conference, pages 357–388. Springer, 2017.
[42] S. King. Primecoin: Cryptocurrency with prime number proof-of-work. July 7th, 2013.
[43] T. Kluyver, B. Ragan-Kelley, F. Pérez, B. E. Granger, M. Bussonnier, J. Frederic, K. Kelley, J. B. Hamrick, J. Grout, S. Corlay, et al. Jupyter notebooks-a publishing format for reproducible computational workflows. In ELPUB, pages 87–90, 2016.
[44] Lerner, Sergio D. Rootstock plattform. http://www.the-blockchain.com/docs/Rootstock-WhitePaper-Overview.pdf. Accessed: 2017-06-05.
[45] Y. Lewenberg, Y. Bachrach, Y. Sompolinsky, A. Zohar, and J. S. Rosenschein. Bitcoin mining pools: A cooperative game theoretic analysis. In Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, pages 919–927. International Foundation for Autonomous Agents and Multiagent Systems, 2015.
[46] Litecoin community. Litecoin reference implementation. https://github.com/litecoin-project/litecoin. Accessed: 2017-09-28.
[47] I. Maven. Apache maven project, 2011.
[48] G. Maxwell. Comment in "[bitcoin-dev] weak block thoughts...". https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2015-Septembe011198.html, 2016. Accessed: 2017-05-10.
[49] S. Meiklejohn, M. Pomarole, G. Jordan, K. Levchenko, D. McCoy, G. M. Voelker, and S. Savage. A fistful of bitcoins: characterizing payments among men with no names. In Proceedings of the 2013 conference on Internet measurement conference, pages 127–140. ACM, 2013.
[50] S. Micali. Algorand: The efficient and democratic ledger. http://arxiv.org/abs/1607.01341, 2016. Accessed: 2017-02-09.
[51] A. Miller, A. Juels, E. Shi, B. Parno, and J. Katz. Permacoin: Repurposing bitcoin work for data preservation. In Security and Privacy (SP), 2014 IEEE Symposium on, pages 475–490. IEEE, 2014.
[52] A. Miller, A. Kosba, J. Katz, and E. Shi. Nonoutsourceable scratch-off puzzles to discourage bitcoin mining coalitions. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pages 680–691. ACM, 2015.
[53] B. Momjian. PostgreSQL: introduction and concepts, volume 192. Addison-Wesley New York, 2001.
[54] Myriad core developers. Myriadcoin reference implementation. https://github.com/myriadcoin/myriadcoin. Accessed: 2017-06-05.
[55] S. Nakamoto. Bitcoin: A peer-to-peer electronic cash system. https://bitcoin.org/bitcoin.pdf, Dec 2008. Accessed: 2017-09-28.
[56] S. Nakamoto. Merged mining specification. https://en.bitcoin.it/wiki/Merged_mining_specification, Apr 2011. Accessed: 2017-09-28.
[57] Namecoin Community. Merged mining. https://github.com/namecoin/wiki/blob/masteMerged-Mining.mediawiki#Goal_of_this_namecoin_change. Accessed: 2017-08-20.
[58] Namecoin community. Namecoin reference implementation. https://github.com/namecoin/namecoin. Accessed: 2017-09-28.
[59] A. Narayanan, J. Bonneau, E. Felten, A. Miller, and S. Goldfeder. Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction. Princeton University Press, 2016.
[60] K. Nayak, S. Kumar, A. Miller, and E. Shi. Stubborn mining: Generalizing selfish mining and combining with an eclipse attack. In 1st IEEE European Symposium on Security and Privacy, 2016. IEEE, 2016.
[61] K. J. O’Dwyer and D. Malone. Bitcoin mining and its energy footprint. 2014.
[62] R. Pass, L. Seeman, and A. Shelat. Analysis of the blockchain protocol in asynchronous networks. In Annual International Conference on the Theory and Applications of Cryptographic Techniques, pages 643–673. Springer, 2017.
[63] D. Pointcheval and J. Stern. Security arguments for digital signatures and blind signatures. Journal of cryptology, 13(3):361–396, 2000.
[64] Pseudonymous("TierNolan"). Decoupling transactions and pow. https://bitcointalk.org/index.php?topic=179598.0, 2013. Accessed: 2017-05-10.
[65] P. R. Rizun. Subchains: A technique to scale bitcoin and improve the user experience. Ledger, 1:38–52, 2016.
[66] K. Rosenbaum. Weak blocks - the good and the bad. http://popeller.io/index.php/2016/01/19/weak-blocks-the-good-and-the-bad/, 2016. Accessed: 2017-05-10.
[67] K. Rosenbaum and R. Russell. Iblt and weak block propagation performance. Scaling Bitcoin Hong Kong (6 December 2015), 2015.
[68] M. Rosenfeld. Analysis of bitcoin pooled mining reward systems. arXiv preprint arXiv:1112.4980, 2011.
[69] M. Rosenfeld. Analysis of hashrate-based double spending. http://arxiv.org/abs/1402.2009, 2014. Accessed: 2016-03-09.
[70] R. Russel. Weak block simulator for bitcoin. https://github.com/rustyrussell/weak-blocks, 2014. Accessed: 2017-05-10.
[71] A. Sapirshtein, Y. Sompolinsky, and A. Zohar. Optimal selfish mining strategies in bitcoin. In International Conference on Financial Cryptography and Data Security, pages 515–532. Springer, 2016.
[72] Sathoshi Nakamoto. Comment in "bitdns and generalizing bitcoin" bitcointalk thread. https://bitcointalk.org/index.php?topic=1790.msg28696#msg28696. Accessed: 2017-06-05.
[73] O. Schrijvers, J. Bonneau, D. Boneh, and T. Roughgarden. Incentive compatibility of bitcoin mining pool reward functions. In FC ’16: Proceedings of the the 20th International Conference on Financial Cryptography, February 2016.
[74] B. Sengupta, S. Bag, S. Ruj, and K. Sakurai. Retricoin: Bitcoin based on compact proofs of retrievability. In Proceedings of the 17th International Conference on Distributed Computing and Networking, page 14. ACM, 2016.
[75] N. Szabo. Bit gold. http://unenumerated.blogspot.co.at/2005/12/bit-gold.html, 2005. Accessed: 2017-09-28.
[76] M. B. Taylor. Bitcoin and the age of bespoke silicon. In Proceedings of the 2013 International Conference on Compilers, Architectures and Synthesis for Embedded Systems, page 16. IEEE Press, 2013.
[77] Unitus developers. Unitus reference implementation. https://github.com/unitusdev/unitus. Accessed: 2017-08-22.
[78] M. Vukolić. The quest for scalable blockchain fabric: Proof-of-work vs. bft replication. In International Workshop on Open Problems in Network Security, pages 112–125. Springer, 2015.
[79] P. Webb, D. Syer, J. Long, S. Nicoll, R. Winch, A. Wilkinson, M. Overdijk, C. Dupuis, and S. Deleuze. Spring boot reference guide. Technical report, 2013-2016.
[80] A. Zamyatin. Name-squatting in namecoin. (unpublished BSc thesis, Vienna University of Technology), 2015.
submitted by dj-gutz to myrXiv [link] [comments]

Regarding the "Bitcoin and Magical Thinking" blog post spotlighted on Techmeme today - The network, the infrastructure, and the community behind it is hardly a "magical thought."

I'm referring to this post, which a Bitcoin-opposing friend just sent to me with the subject line, "An damning indictment" -
http://www.techmeme.com/131219/p3#a131219p3
I responded with this:
The network, the infrastructure, and the community behind Bitcoin is hardly a "magical thought" (Here's the definition of that concept from contemporary Western psychology: http://en.wikipedia.org/wiki/Magical_thinking)
Two weeks ago, there was very good debate about Bitcoin -
Ultimate Bitcoin Showdown - Posted Dec 2, 2013 - [30:14] - Goldbug/dollar-skeptic Peter Schiff vs. Erik Voorhees, Bitcoin entrepreneur formerly of BitInstant (https://www.bitinstant.com/), now of Coinapult (https://coinapult.com/) - http://www.linkedin.com/pub/erik-voorhees/b/804/385
I'll post the link to the full video below, but I first want to quote from it:
As Voorhees says, gold-backed digital curencies have been attempted and were then quickly shut down by the gov't. He later says (at 9:20), "[Bitcoin] could absolutely go to zero and the whole thing is completely experimental right now. So I'm not here to say that Bitcoin is a good investment. What I'm here to say is that the Bitcoin payment network is one of the most important technologies that has ever been invented, and it's important to understand that there is value in that technology [and] it's important to understand why that technology is so useful to people, especially people who care about liberty around the world." And he explains later that this infrastructure cannot be reproduced easily...even if Bitcoin is not the winner of the crypto-currency market competition. He also compares the hardy vitality of P2P currencies to that of P2P file-sharing. The free, independent Napster file-sharing service was launched in June of 1999 an rocketed to popularity, but the shutdown of it in July of 2001 was not exactly the end of free P2P music-sharing... In fact, just going by the services that I can just recall fellow college students using at the time, there was:
SoulSeek (launched in 1999/2000)
Gnutella (early 2000)
BearShare (December 2000)
Morpheus (2001)
Kazaa (March 2001), and
LimeWire (May 2000).
And of course there are the file-sharing services that are popular today, from Dropbox to these:
http://www.ebizmba.com/articles/file-sharing-websites
to these:
http://en.wikipedia.org/wiki/Comparison_of_BitTorrent_clients
Now. As far as digital crypto-currencies today, there's Litecoin, Peercoin, Namecoin, Quark, Protoshares, Worldcoin, Megacoin, Primecoin, and Dogecoin, and dozens other listed here, totaling in 54:
http://coinmarketcap.com/
The point that Voorhees makes about the pooled inventiveness and ingenuity of the crowd reminds me of something both revolutionary and prophetic that was said by John Gilmore (an American computer science innovator, Libertarian, Internet activist, and one of the founders of Electronic Frontier Foundation). He said:
"The Net interprets censorship as damage and routes around it."
-As quoted in TIME magazine (6 December 1993) (yes, 1993!)
http://en.wikiquote.org/wiki/John_Gilmore
Furthermore, on a separate note, the media angle that Bitcoin is practically "over" because of China blocking it (which that same friend was gloating about), here's all I have to say as well:
Here's a list of enterprises that were hardly destroyed after being banned in glorious all-powerful China:
Facebook, YouTube, Twitter, Wikipedia, WikiLeaks, and the New York Times' online edition (and a few others, named at the following links) were each NOT blasted into nonexistence by the force of "the Golden Shield Project," which we Americans call "the Great Firewall." Yup, Bitcoin is "over"!
References:
https://en.wikipedia.org/wiki/List_of_websites_blocked_in_China
https://en.wikipedia.org/wiki/Censorship_of_Wikipedia#China
http://www.nytimes.com/2012/10/26/world/asia/china-blocks-web-access-to-new-york-times.html?_r=0
https://en.wikipedia.org/wiki/Internet_censorship_in_the_People%27s_Republic_of_China
Hey, but waddaya know - Some of the 1,350,695,000 people in The People's Republic have ways around that censorship, as do the millions of people in so many other Internet-censoring countries:
https://en.wikipedia.org/wiki/Internet_censorship_in_the_People%27s_Republic_of_China#Evasion
http://en.wikipedia.org/wiki/Internet_censorship_circumvention#Software

Here's the full video of the Bitcoin debate:
http://www.youtube.com/watch?v=7mUn-d8R98k
Edit/Follow-up: To extend the analogy of P2P digital currencies and P2P file-sharing (and most notably, music-sharing), what would be the currency equivalent of iTunes, which came ou in January 2001? Will JPMorgan's crypto-currency project (as I saw here, and it was downvoted to hell: http://www.reddit.com/Bitcoin/comments/1sp6hh/jpmorgan_is_looking_to_copy_bitcoin_and_the_coin/), even though it was initially rejected 175 times, find some way to charge/surcharge people small amounts at a time for usage (a la iTunes' 99 cents per song), in traditional-bank-style?
submitted by wazzzzah to Bitcoin [link] [comments]

GET RICH OR DIE ​​ BLACKJACK vs LITECOIN ​​ BIG WIN STAKE COM Bitcoin vs Litecoin vs Dogecoin Screw Bitcoin - Litecoin vs Dogecoin Easiest way to mine Bitcoin, Litecoin, PPCoin, Namecoin, Feathercoin, and Dogecoin Dogecoin and litecoin mining

Market Cap: $259 126 072 897 Coins: 1 760 Exchanges: 218 Market Cap: $259 126 072 897 Volume (24h): $68 436 058 083 Dominance: BTC 65,9% ETH 10,4% XRP 3,8% USDT 3,6% Litecoin – 84 Million Coins Faster Than Bitcoin Capitalization: 734 Million Dollars. Price as of 12/2/12: ~$30 . Pros: • At .5 billion dollars, it has the second or third biggest market cap Differences Between Bitcoin Vs; First; Prev.Dogecoin Unaffected By Bitcoin Bug; Enter an address, transaction hash, block hash, block number, or wallet name. Bitcoin, Litecoin, Namecoin, Dogecoin, Peercoin, Ethereum stats11 sat/byte Hour Fee: Bitcoin$0; Litecoin, Dogecoin, and Bitcoin Cash Are in the What Is The Difference Between Dogecoin and Litecoin? You can compare two coins on the most important indicators, such as price, volume, market cap, max supply, algorithm, etc. Dogecoin, "an open source peer-to-peer cryptocurrency, favored by Shiba Inus worldwide" now accounts for more transaction volume than every other cryptocurrency combined, including Bitcoin

[index] [21913] [11030] [9342] [29165] [24738] [19491] [2696] [20820] [21431] [30352]

GET RICH OR DIE ​​ BLACKJACK vs LITECOIN ​​ BIG WIN STAKE COM

Bitcoin vs Litecoin vs Dogecoin 🤑Copy This Idea: Kick-start Your Way to Making Big Money from Your Laptop at Home, on the Beach or anywhere you Choose - Go n... Hey Everyone! Today I have a video about Litecoin vs Bitcoin. This video is not intended to help you make an investment choice but it will help you with the differences between these two. Use any CPU or GPU for any coin, SHA-256 or Scrypt, any computer, as many computers, and with immediate mining results. https://www.eobot.com/new.aspx?referi... How To Pay Off Your Mortgage Fast Using Velocity Banking How To Pay Off Your Mortgage In 5-7 Years - Duration: 41:34. Think Wealthy with Mike Adams Recommended for you #Bitcoin #Stake #Litecoin ஜ ஜ The High Stakes Casino. 100% provably fair and transparent gambling with Bitcoin, Ethereum and Litecoin DogeCoin, Ripple.

Flag Counter