Published on: 2014-05-10T11:05:29+00:00
The discussion revolves around several emails that were sent to the Bitcoin-development mailing list. One member, named 'kjj', criticizes the Selfish Mining paper and its unsuitability as a simulation of the Bitcoin system. They argue that the model used in the paper lacks latency and assumes attackers have total visibility across the network. In response to this, 'kjj' offers a bounty of 1 BTC for building a general Bitcoin network simulator framework that can account for latency between nodes and simulate an attacker owning varying fractions of the network.Another contributor expresses frustration with the Selfish Mining paper and criticizes the authors for assuming a total sybil attack without realizing that the conditions necessary for the attack are worse than the attack itself. This contributor also offers a bounty of 1 BTC for building a suitable network simulator that can account for latency and simulate various network scenarios.The author of one email questions the level of accuracy required for a Bitcoin network simulator and suggests conducting experiments to clarify the necessary components. They mention testing Peter Todd's miner strategy, various network split conditions, double spends, and other scenarios. Jeff Garzik offers to contribute 1 BTC to this project.In addition, one email criticizes academics for prioritizing publishing over being helpful to society. The author specifically mentions the Selfish Mining paper, which they believe is based on a flawed model that does not accurately simulate the Bitcoin system. To address the lack of a decent network simulator that allowed the paper to gain press attention, the author offers a bounty of 1 BTC for building a general Bitcoin network simulator framework that can account for latency between nodes and simulate an attacker owning varying fractions of the network.Furthermore, an author on bitcointalk.org criticizes the Selfish Mining paper for its lack of latency and proposes the need for a general Bitcoin network simulator framework that can account for latency between nodes, simulate an attacker owning varying fractions of the network, and be easily modified for other schemes. This author also offers a bounty of 1 BTC for building such a simulator, as the lack of a decent network simulator allowed the Selfish Mining paper to gain attention.
Updated on: 2023-08-01T06:27:39.645643+00:00