Return-Path: Received: from smtp1.linuxfoundation.org (smtp1.linux-foundation.org [172.17.192.35]) by mail.linuxfoundation.org (Postfix) with ESMTPS id 07F78C88 for ; Wed, 3 May 2017 19:10:50 +0000 (UTC) X-Greylist: whitelisted by SQLgrey-1.7.6 Received: from mail-yw0-f182.google.com (mail-yw0-f182.google.com [209.85.161.182]) by smtp1.linuxfoundation.org (Postfix) with ESMTPS id 7EB4B192 for ; Wed, 3 May 2017 19:10:49 +0000 (UTC) Received: by mail-yw0-f182.google.com with SMTP id 203so89946393ywe.0 for ; Wed, 03 May 2017 12:10:49 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=hrXPCRA1yDfCa9aOj6kKUu/tiwUGaB4A0/GEgak1Qwk=; b=ljZL/v/AxTSZngr8wtsD8eq7TWTA+Euy99K+lfL4ZAVe3rjvgayUejghakaejeKaU1 L2wiAjSlDZWolKE+htaAA7Ad7nxaMdvQn+AgZxOpKDhAVOi/HjcHJdwajLoQXv5gG7D6 vmG4N+TE+H72lzFNaj/Qqgav9DvyLMxGZoXchPv8z9EzC/DjRzlbEtHIb02YGf7RyYQt Xla0orqyDpQSAVvhTI+ezHpih5DoJs7t9A4wKd+P1Z0jj6GyynkZOjEriNCUPwvoRkqw KuSEnikvUVA7tIVoMh0/yv256QTkHSHWmLOwnpMmzgsPLEu7Jt/heXF+YPPFLc8wklHN RQnw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=hrXPCRA1yDfCa9aOj6kKUu/tiwUGaB4A0/GEgak1Qwk=; b=NP3YNgfv8Q//5N2wYodhtvp+M+vCYBbq1HYPdgOsFeVvwPTGD+0FrrVMe6mP83sn6K ZgEeyubrSj87kV37I88VljOywVy57YA1iGpsmonv2Mz8gWTMs0+j3vsSsyBjryJeSHDt 4GIvB+tdeZXfai7eCvKVNkCg5tpU5QvgVNEaSJ0edu3EcBL2ohABI/3gEasjyloXdIgq l+8vWCDkL4/D7lzoTTTlUtjvbLc+V/gUvYR72kzFXk9EnOAz/7vv1bmnBKz3TeuUYJ63 K837FM0AlVBo3Di7kZNReE/AMywOyRQqp6ijDmBqT2lAKJ4OT/ACnrRsfMD3uTRYk0te YKYA== X-Gm-Message-State: AN3rC/4I1DLqxgwK1qfyHt4qDv5q8bdScGc5XCNiu9j3bKncPuOcA4m8 j/LXaAXQ7TxkV82KoCCCOrl5o0W2ew== X-Received: by 10.129.85.72 with SMTP id j69mr30870084ywb.220.1493838648721; Wed, 03 May 2017 12:10:48 -0700 (PDT) MIME-Version: 1.0 Received: by 10.37.35.88 with HTTP; Wed, 3 May 2017 12:10:47 -0700 (PDT) Received: by 10.37.35.88 with HTTP; Wed, 3 May 2017 12:10:47 -0700 (PDT) In-Reply-To: References: From: Natanael Date: Wed, 3 May 2017 21:10:47 +0200 Message-ID: To: Erik Aronesty Content-Type: multipart/alternative; boundary=001a113f1bbe0260e2054ea36a4e X-Spam-Status: No, score=-1.5 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID, DKIM_VALID_AU, FREEMAIL_FROM, HTML_MESSAGE, RCVD_IN_DNSWL_NONE, RCVD_IN_SORBS_SPAM autolearn=no version=3.3.1 X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on smtp1.linux-foundation.org Cc: Bitcoin Dev Subject: Re: [bitcoin-dev] Small Nodes: A Better Alternative to Pruned Nodes X-BeenThere: bitcoin-dev@lists.linuxfoundation.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Bitcoin Protocol Discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 03 May 2017 19:10:50 -0000 --001a113f1bbe0260e2054ea36a4e Content-Type: text/plain; charset=UTF-8 Den 3 maj 2017 16:05 skrev "Erik Aronesty via bitcoin-dev" < bitcoin-dev@lists.linuxfoundation.org>: > But as you've observed, the failure probabilities are rather high, > especially if an active attacker targets nodes carrying less commonly > available blocks. Wouldn't the solution be for nodes to use whatever mechanism an attacker uses to determine less commonly available blocks and choose to store a random percentage of them as well as their deterministic random set? IE X blocks end of chain (spv bootstrap), Y% deterministic random set, Z% patch/fill set to deter attacks Then he uses Sybil attacks to obscure what's actually rare and not. Even proof of storage isn't enough, you need proof of INDEPENDENT storage, which is essentially impossible, as well as a way of determining which nodes are run by the same people (all the AWS nodes should essentially count as one). --001a113f1bbe0260e2054ea36a4e Content-Type: text/html; charset=UTF-8 Content-Transfer-Encoding: quoted-printable

=
De= n 3 maj 2017 16:05 skrev "Erik Aronesty via bitcoin-dev" <bitcoin-dev@lists.linu= xfoundation.org>:
<= div dir=3D"ltr">
> But as you've= observed, the failure probabilities are rather high,
> especially if= an active attacker targets nodes carrying less commonly
> available = blocks.=C2=A0

Wouldn't the solution be for nodes to= use whatever mechanism an attacker uses to determine less commonly availab= le blocks and choose to store a random percentage of them as well as their = deterministic random set?=C2=A0

IE X blocks end of chain (spv boots= trap), Y% deterministic random set,=C2=A0 Z% patch/fill set to deter attack= s

Then he uses Sybil attacks to obscure what's actually rare= and not. Even proof of storage isn't enough, you need proof of INDEPEN= DENT storage, which is essentially impossible, as well as a way of determin= ing which nodes are run by the same people (all the AWS nodes should essent= ially count as one).=C2=A0
--001a113f1bbe0260e2054ea36a4e--