<oembed><type>rich</type><version>1.0</version><title>Bastien TEINTURIER [ARCHIVE] wrote</title><author_name>Bastien TEINTURIER [ARCHIVE] (npub17f…ntr0s)</author_name><author_url>https://yabu.me/npub17fjkngg0s0mfx4uhhz6n4puhflwvrhn2h5c78vdr5xda4mvqx89swntr0s</author_url><provider_name>njump</provider_name><provider_url>https://yabu.me</provider_url><html>📅 Original date posted:2019-11-22&#xA;📝 Original message:&#xA;While I agree with most of your points, I think there are subtleties to&#xA;explore before&#xA;completely rejecting the idea.&#xA;&#xA;every use of proof-of-work today (other than to power Bitcoin itself, as&#xA;&gt; Bitcoin cannot support itself) can instead be done by using Bitcoins to&#xA;&gt; impose this economic cost.&#xA;&gt;&#xA;&#xA;That is philosophically true, but the complexity of integrating that small&#xA;PoW into Lightning&#xA;is much lower than the complexity of integrating **fair, un-gameable**&#xA;upfront payments.&#xA;And not all PoW is born equal: there are a lot of PoW schemes that have&#xA;different trade-offs&#xA;than Bitcoin mining (think ASIC-resistance such as variants of Cuckoo&#xA;Cycle).&#xA;&#xA;Another key point is that creating ASICs for this PoW is fundamentally&#xA;different from creating&#xA;ASICs for mining a crypto-currency. Solving this PoW doesn&#39;t earn you any&#xA;money: it merely&#xA;allows you to spam to temporarily disrupt the network.&#xA;Since this PoW isn&#39;t used in any consensus, we can change the spam PoW&#xA;algorithm anytime&#xA;we want, making all previous ASICs obsolete.&#xA;So it&#39;s not obvious to me that anyone would find it viable to invest in&#xA;creating such ASICs.&#xA;&#xA;As hardware specialization for the specific Lightning-Network-proof-of-work&#xA;&gt; arises, we will find that to practically limit spam, intermediate nodes&#xA;&gt; will have to increase and increase the threshold for accepting&#xA;&gt; proof-of-work, as spammers are going to switch to the more-specialized&#xA;&gt; hardware.&#xA;&gt;&#xA;&#xA;That&#39;s where I think it can be more subtle than what you describe (I may be&#xA;wrong though as&#xA;predicting future behavior is hard).&#xA;&#xA;Since I&#39;m ruling out ASICs, we&#39;re only dealing with &#34;normal&#34; hardware&#xA;bottlenecks (cpu/ram).&#xA;That means attackers are not playing at a completely different scale than&#xA;normal users.&#xA;The cost for attackers to generate an amount of spam mimicking N normal&#xA;users will then be&#xA;somewhat linear in N (to be investigated further).&#xA;That&#39;s exactly the same result as upfront payments, where an attacker can&#xA;still spam like&#xA;he&#39;s N users if he&#39;s ready to pay a cost linear in N.&#xA;&#xA;I&#39;m slightly playing devil&#39;s advocate for the PoW proposal because I think&#xA;it&#39;s worth exploring&#xA;more, even if we eventually abandon it. Maybe you&#39;re right and it won&#39;t be&#xA;as effective to&#xA;fight spam as upfront payments: but right now with the arguments I&#39;ve seen&#xA;on this thread,&#xA;I&#39;m not yet convinced of that.&#xA;&#xA;Cheers,&#xA;Bastien&#xA;-------------- next part --------------&#xA;An HTML attachment was scrubbed...&#xA;URL: &lt;http://lists.linuxfoundation.org/pipermail/lightning-dev/attachments/20191122/32cc41a8/attachment.html&gt;</html></oembed>