- Dec 16, 2015
- 2,806
- 6,088
@shilch I read the article. It suggested some technical means of filtering financial transactions according to some lists which divide into acceptable and unacceptable.
Now where's that related patent? As I said I'd like to give it a look.
Producing a pre-image seems to serve no economical purpose in Bitcoin -- as long as SHA256 is unbroken the original content of the candidate block cannot be verified by the recipient.
If you're planning to extract more money out of people by censoring transactions, you don't need to sell the pre-image.
If you're planning to extract more money out of people by including certain transactions, you don't need to sell the pre-image.
If you're planning to install a filter which discards certain blocks of which you don't approve (aka a censorship machine), the pre-image may be useful since you save another round of SHA256, although even for that I think the use is limited.
However, I mentioned the censorship application because that's what Craig's article was describing towards the end.
Now where's that related patent? As I said I'd like to give it a look.
I find it unconvincing for the reasons that people have already stated publicly.produce preimages that hash to a valid difficulty target and then sell that preimage (without actually knowing the block header) thereby digitally signing the fraud. And because it is not cryptographically 100% secure, people consider this idea "unconvincing"
Producing a pre-image seems to serve no economical purpose in Bitcoin -- as long as SHA256 is unbroken the original content of the candidate block cannot be verified by the recipient.
If you're planning to extract more money out of people by censoring transactions, you don't need to sell the pre-image.
If you're planning to extract more money out of people by including certain transactions, you don't need to sell the pre-image.
If you're planning to install a filter which discards certain blocks of which you don't approve (aka a censorship machine), the pre-image may be useful since you save another round of SHA256, although even for that I think the use is limited.
However, I mentioned the censorship application because that's what Craig's article was describing towards the end.
I have the feeling your question was targeted at the SHA256 claims by Craig, so I only respond to those here.What do you find unconvincing about it?