BIP proposal: Inhibiting a covert attack on the Bitcoin POW function [combined summary]



Individual post summaries: Click here to read the original discussion on the bitcoin-dev mailing list

Published on: 2017-04-07T13:28:13+00:00


Summary:

The discussion surrounding ASICBOOST and other mining optimizations in the Bitcoin community revolves around ethical implications, technical details, and potential impacts. One argument is that ASICBOOST reduces the amount of work needed to prove a certain amount of work has been done in Bitcoin's Proof of Work, but it is debated whether this qualifies as an attack. The debate also raises concerns about the ethical implications of keeping optimizations for oneself and how they could discourage growth and improvement of the Bitcoin protocol.There is a debate about implementing a system to invalidate covert ASICBOOST, with some miners resisting due to potential loss of mining revenue. The difficulty of implementing such a change is acknowledged, as it involves invalidating hardware or optimized bits. The concept of burn, which occurs regardless of successful mining, is also discussed, with suggestions of a burn-network to prevent burns by blocking transactions other than one's own. However, this approach is seen as weak, and there is no intention to roll back the blockchain like in the DAO fork.The discussion also focuses on Bitmain's claims regarding ASICBOOST support and the need for independent verification. There are proposals to inhibit covert attacks on the Bitcoin Proof of Work function, with scrutiny due to conflicts with other proposals. The feasibility and potential benefits of optimization techniques involving partial hash collisions in Merkle roots are examined, along with their compatibility with the stratum mining protocol.Concerns are raised about the incentive created by ASICBOOST to make blocks smaller, which is undesirable for the Bitcoin network. The complexity of the Proof of Work algorithm and the potential for unique optimizations that can be patented are also discussed. Simplifying the algorithm is suggested as a way to prevent hidden or unexpected optimizations. The conversation highlights the various viewpoints on ASICBOOST and its impact, with some arguing for its elimination to prevent unfair advantages and maintain network security, while others raise ethical concerns and potential negative impact on miners.Gregory Maxwell proposes updates to the Bitcoin protocol to inhibit covert forms of ASICBOOST mining, citing the reduction in work required and potential harm to the system. The ongoing conflict between Bitmain and Bitcoin developers over the use of ASICBOOST is compared to the DAO hack. There are arguments for and against blocking ASICBOOST, with some emphasizing the need for strong justification before changing the blockchain rules.Discussions also touch on other topics, such as potential security flaws in Bitcoin and proposals for soft fork solutions. A BIP draft is proposed to address ASICBOOST mining, aiming to inhibit covert usage that interferes with protocol improvements. Gregory Maxwell proposes a solution to a potential security problem caused by a design oversight in the proof of work function, suggesting a new consensus rule to prevent covert attacks.Overall, these discussions show ongoing efforts to address vulnerabilities, improve the Bitcoin protocol, and find a balance between fairness, network security, and the interests of miners. Proposed rules aim to sunset when no longer necessary and address potential vulnerabilities associated with non-covert forms.


Updated on: 2023-08-01T20:18:06.346495+00:00