yup, and a simple SHA256 ASIC is so cheap and easy to make.
RandomX is really hard to implement on hardware, so creating an ASIC for it is gonna be really expensive.
CPU's profit from it because it's specifically made for CPU, and the memory hard operations make mining on GPU's the same as/slower then CPU mining.
thinking of writing a nostr proxy that:
- uses TCP instead of websockets
- uses msgpack instead of JSON
and some other nifty stuff for making Nostr easier on the bandwith.
Y or N?
true, but actively fighting against massive farms with thousands of GPU's and ASIC's, and putting CPU miners in front allows for more decentralization as smaller miners now also have a chance of giving back to the network.
pools are great for giving smaller miners a chance,, but they are a possible attack vector because of centralization (p2pool excluded, as it is peer to peer)
on the other side, this is easy mining botnets too (especially IoT botnets).
yeah, actually. It's trivial for a gov funded group to have a lot of ASIC's join the miners and easily turn the entire network into their bitch.
hence why ASIC resistant mining is a thing. hence why you should use Monero :)
Buy a thinkpad x230 and install heads. Write protect the flash chip. Put nail polish on the screws and take high resolution pictures to ensure signs of tampering. Do NOT use a HDD or SSD. They have DMA so a malicious firmware could do a lot of damage, use of USB is preferred since they do not have DMA. Completely remove the microphone, sound card, webcam and the WWAN card from the laptop. Remove the fan to prevent binary acoustic data transmission. Replace the default wifi card with a supported atheros card. Disable wifi when not in use, preferably by physically removing the card. Make your own independent Linux distro from scratch. Most Linux distros value convenience over security and will thus never have good security. Your only option is to make your own. Use musl instead of glibc, Libressl instead of openssl, sinit instead of systemd, oksh instead of bash, toybox instead of gnu coreutils to reduce attack surface. Enable as little kernel modules as possible. Use a hardened memory allocator. Apply strong SELinux and sandboxing policies. Restrict the root account heavily to make sure it never gets compromised. Disable JavaScript and CSS in your browser. Block all FAGMAN domains in your hosts file. Monitor all network requests. Do not use a phone. Never speak near anyone who owns a phone, they are always listening. Never use any non-corebooted technology made after 2006. Never leave your devices unattended. Tape triple layer aluminum foil all around your room as tempest shielding. Type really quietly as defense against audio keylogging. Use ecc ram to minimize rowhammer and rambleed. Encrypt everything multiple times with various different encryption implementations. Compile everything from source. Use hardened compilation flags. Always read through the source before installing something if possible. Only use the internet when absolutely necessary.
nah, something like RandomX or EquiX must be used.
or, even beter, Useful Proof of work: factorizing primes, solving computationally hard and useful problems, or anything like that (too lazy to type more lel)
nostr:nevent1qqswzu0rnq55uakqlh233z5qhqg45pa72sms780xwkmrcqayk8q4nhcpz4mhxue69uhkyetkduhxummnw3erztnrdaksz9nhwden5te0vf5hgcm0d9hx2u3wwdhkx6tpdsq3uamnwvaz7tmxv4jkguewdehhxarj9e3xzmny9acx7ur4d3shyqgdwaehxw309ahx7uewd3hkcqgewaehxw309ahx7um5wgh8g6r9wdsk6etrv96zu6t0qyghwumn8ghj7mn0wd68yv339e3k7mgpz3mhxue69uhhyetvv9ujuerpd46hxtnfduq3vamnwvaz7tmjv4kxz7fwdehhxarj9e3xzmnyr2pw3v
depends, if a simple SHA256 hashcash/bitcoin PoW is implemented it really isn't as expensive as you think.
+ there's probably somebody already solving Nostr's PoW for a few sats
nostr:nevent1qqsq7xwmesh70cnvukqn92dqfan0nhrwwmvkx7uxr903fwzetld4kkcpp4mhxue69uhkummn9ekx7mqpz3mhxue69uhhyetvv9ujuerpd46hxtnfduq3vamnwvaz7tmjv4kxz7fwdehhxarj9e3xzmnyyhrcef
people will ask, why? And I will reply with, why not?
nostr:nevent1qqsfrx0kjcjqkgtm39fldzwahc8ruznel8z553r0refrkn0qn9kxznqpzemhxue69uhhyetvv9ujumn0wd68ytnzv9hxgp3xzse
Monero is more ASIC resistant than Bitcoin, so it is much better than a simple SHA256 based PoW.
Also, because it's so ASIC resistant, it gives the little miners (potato cpu havers) a better chance at contributing to the network. Bitcoin has huge ASIC miner farms absolutely dominating the network, and because SHA256 hardware implementations are so trivial to make, said ASIC's are very cheap too.
imo, Monero is the best thing to have if you care about your anonimity
Nah Ulbricht got what he deserved. He didn't enforce proper OPSEC rules, and got caught because of his own mistakes.
Boontje komt om z'n loontje, as we say in holland.
Notes by Fiji | export