-
hyc
not honoring license is actionable
-
hyc
people need to understand that "open source" doesn't mean public domain, you can't just do whatever the hell you want.
-
hyc
and we should all be moving away from "permissive" open source licenses. GPL only.
-
hyc
permissive just means "I can exploit your work and your community can fuck off"
-
selsta
hyc: they rewrote it in Go but had the same comments as our code lol
-
hyc
sheesh
-
selsta
so it was an obvious copy
-
hyc
well, rewriting in another language ... isn't purely mechanical, took at least some thought.
-
hyc
so derivative but not copy/paste
-
hyc
but still, yes, owes attribution
-
selsta
they claimed their version is 10x faster, scammy all around :D
-
hyc
bleah
-
cjd
ouch
-
sech1
selsta who claimed?
-
selsta
Dero claimed the bulletproof implementation is 10x faster but this was year(s) ago
-
selsta
someone just brought Dero up for having a new CPU mineable algorithm
-
selsta
Anyone following the BCH 12.5% dev tax drama?
-
selsta
Shows again why ASIC resistance is important.
-
cjd
BWT does not seem like it would be resistant to GPU implementations
-
hyc
saw the dev tax thing, what's it got to do with the PoW algo?
-
selsta
The hashrate appears to be centralized to a few Chinese ASIC pools.
-
koe
can you leverage PoW to detect MitM for active communication channels? basically it can force the attacker to conduct two parallel conversations, since if both honest actors expect each message packet to be delayed by ~N, the attacker can't intercept a packet from A, modify it, and send it to B, then receive the response, modify it, and send to A,
-
koe
in 2N time. Use onion encryption so the message actually bounces back and forth between senders before being opened, with PoW between each bounce. Even if the attacker has infinite hash speed, they must conform to delays expected by each actor.
-
koe
My question is, can parallel conversations be used to identify MitM?
-
koe
well if it's just timing idk if PoW matters
-
koe
nvm seems like the attacker can just alternate fake and altered messages, making the actual communication slower but avoiding parallel real convos