P2SH is a normal transaction where the output scriptPub has this form:
<OP_HASH160> <redeemScriptHash> <OP_EQUAL>
P2SH is a normal transaction where the output scriptPub has this form:
<OP_HASH160> <redeemScriptHash> <OP_EQUAL>
It's some conciliation that these 'people' function more like entities or organisations, and as such are made up of self serving individuals. Whilst the entity attempts to be parasitical on the system the individuals are selfishly trying to preserve their wealth. What better way than to store it as untraceable digital sound money?It's not wise to underestimate the capabilities of the people who pursue the parasitical economic strategy - they are as skilled at producing deception and exploitation as the people who pursue the productive strategy are at creating economic value.
Seems to me the hub model will simply create a much smaller attack surface. Why attempt take down 10 000 Nodes when you can hit 200 Hubs? Expect these Hubs to become monitoring stations, with KYC/AML. or IP logging/Facebook LoginsSuppose that LN does in fact work out they way they intend, but there is hub centralization (which I still can't see not being extremely plausible), and suppose they even totally nail how the routing should work.
@AdrianXThis interview with Jeff Garzik does give me faith that Bitcoin will survive the Block Stream hack.
The other great thing is that it seems Bloq will become yet another 'Browser' for the blockchain. BIPs will hopefully now become like network laws. Once a BIP has 75% Node support (regardless of implementation) and 75% Hash support it's activated for the entire network. This should lead to democratic development teams and a 'we'll implement your feature if you implement ours' culture.Gandalf: "Don't tempt me Frodo! I dare not take it. Not even to keep it safe. Understand Frodo, I would use this Ring from a desire to do good. But through me, it would wield a power too great and terrible to imagine."
Well, as long as I can run my node I'm fine with it...Seems to me the hub model will simply create a much smaller attack surface. Why attempt take down 10 000 Nodes when you can hit 200 Hubs? Expect these Hubs to become monitoring stations, with KYC/AML. or IP logging/Facebook Logins
No I was and still am ignorant to the impacts P2SH could have on Bitcoin. I'd probably be generally opposed to any new features, I'm pro simplifying Bitcoin to its functional elements making it a base kernel and even removing features that cant be practically defined as a direct function of money, I'd like to see a broader set of developers build on the kernel such and implement ideas on there own implementations - or forked implementations.One question to everybody who is willing to respond: were you as critical as now to add a new rule to the Bitcoin when they decided to soft-fork the network enabling P2SH ?
I really like to imagine that there's a supercomputer scheduling the timing of your comments for maximum induced sleeplessness in certain culpritsI'm not out before there is a running PoW fork where I can take my coins..
Soft forks should never be used for changing consensus rules, independently from the proposed change.One question to everybody who is willing to respond: were you as critical as now to add a new rule to the Bitcoin when they decided to soft-fork the network enabling P2SH ?
I think there's a very fundamental difference between softfork segwit and softfork P2SH.One question to everybody who is willing to respond: were you as critical as now to add a new rule to the Bitcoin when they decided to soft-fork the network enabling P2SH ?