Return-Path: Received: from smtp1.osuosl.org (smtp1.osuosl.org [140.211.166.138]) by lists.linuxfoundation.org (Postfix) with ESMTP id B7ADDC002D for ; Wed, 4 Jan 2023 16:03:35 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by smtp1.osuosl.org (Postfix) with ESMTP id 8488380B0C for ; Wed, 4 Jan 2023 16:03:35 +0000 (UTC) DKIM-Filter: OpenDKIM Filter v2.11.0 smtp1.osuosl.org 8488380B0C Authentication-Results: smtp1.osuosl.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.a=rsa-sha256 header.s=20210112 header.b=BIbqE9Kd X-Virus-Scanned: amavisd-new at osuosl.org X-Spam-Flag: NO X-Spam-Score: -2.087 X-Spam-Level: X-Spam-Status: No, score=-2.087 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, LOTS_OF_MONEY=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_MONEY_PERCENT=0.01] autolearn=ham autolearn_force=no Received: from smtp1.osuosl.org ([127.0.0.1]) by localhost (smtp1.osuosl.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id p3nZrmWWJ-zk for ; Wed, 4 Jan 2023 16:03:33 +0000 (UTC) X-Greylist: whitelisted by SQLgrey-1.8.0 DKIM-Filter: OpenDKIM Filter v2.11.0 smtp1.osuosl.org 49C348186E Received: from mail-ed1-x533.google.com (mail-ed1-x533.google.com [IPv6:2a00:1450:4864:20::533]) by smtp1.osuosl.org (Postfix) with ESMTPS id 49C348186E for ; Wed, 4 Jan 2023 16:03:33 +0000 (UTC) Received: by mail-ed1-x533.google.com with SMTP id c34so42596665edf.0 for ; Wed, 04 Jan 2023 08:03:33 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=91MmkAamfCCP/v0J2/TcLvm3SahWwlbybHAPO/ShLBA=; b=BIbqE9KdOWB/ecXtxd4tb1thxgjaCC3k6VcF3ULt0UkReXqi/ay4W4vc7YHKT1773E tkeG43cPogrR2uEFsXZORc3gzt2VjJ8LMsrGZMBJEixvA0GlUlma9X9mc6Dj+uMYkgA7 7W62XQVtcJvDfXUUDtfkAZ/3Jk67jSD8Tmguc6/0ZRifgQQnyrM3taDymeKMJer7lEOD /LPgryznLPErIIp3Oj1vLxNBOfBwZjfcO0hcvhZ3B/kSgQWGNb3YGv1p3x9wCaDcPWa9 Pz3tXNdTcwW0UyqjPO5mku0gEGgBizfm6H2JE+YZFXwDHqDGZrb9ghxPcXQqaq/xJzCH Nj3A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=91MmkAamfCCP/v0J2/TcLvm3SahWwlbybHAPO/ShLBA=; b=Dk6evkd3FuOUQr6/zU9fsWkl4wbUpYppZTitSzutYUPgZqzsQonPT8yvTpNyHLb/tN vGKeiqdY+J2oIsSdxDVlNCW+mFF2kqTAHeDuvO60gY0RkO8nSliRqLrpRzXmEEvL+to+ oNqzLMqIUpUaIloWDtFmVU9XaUH5EUP9MKY4RrboIyyxfH76a4dxCfpGNxtK/s1tch3d Yc7Nmw1fryQFP/BJc8pOIkqbBgdfv8jzqQQfBwiZ/JqD1XACd1fcn0NkPtqGT2WG3jYb fgS3w53BmguGjKnMWyLtui+XlKU5RhZ3fnz3ejHJJqskMr429UprQvDWDivBuNGoUwc6 9YRA== X-Gm-Message-State: AFqh2kqu/wFAFloi9RPYp5PhBLjdDPGAqvXtjIisTeE1OYN8lxFedCwH H8rtujmwRSn+DDG1t8OT0e3yENXMR1wJ6kc3+upjHpa3 X-Google-Smtp-Source: AMrXdXvWa7Exj9QtPOymICjbQbbT6qQb1gWYG0Ko8x3+5zGvl5RDidKzhpYP2ksb5YxtznqGQ6NCjpliSSVoVUJFy/Y= X-Received: by 2002:aa7:d992:0:b0:482:b5b3:9130 with SMTP id u18-20020aa7d992000000b00482b5b39130mr3578397eds.177.1672848211099; Wed, 04 Jan 2023 08:03:31 -0800 (PST) MIME-Version: 1.0 References: <174713476-5bd35a73599a0a65335d70e99a1bb44e@pmq1v.m5r2.onet> In-Reply-To: <174713476-5bd35a73599a0a65335d70e99a1bb44e@pmq1v.m5r2.onet> From: Billy Tetrud Date: Wed, 4 Jan 2023 10:03:10 -0600 Message-ID: To: jk_14@op.pl Content-Type: multipart/alternative; boundary="00000000000062c35105f1725315" X-Mailman-Approved-At: Thu, 05 Jan 2023 11:07:57 +0000 Cc: Bitcoin Protocol Discussion Subject: Re: [bitcoin-dev] Pseudocode for robust tail emission X-BeenThere: bitcoin-dev@lists.linuxfoundation.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: Bitcoin Protocol Discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 04 Jan 2023 16:03:35 -0000 --00000000000062c35105f1725315 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable > In Bitcoin "the show must go on" and someone must pay for it. Active [and/or] passive users I certainly agree. > or more precisely: tiny inflation =F0=9F=91=8D > Right now security comes from almost fully from ~1.8% inflation. Best I could find, fees make up about 13% of miner revenue . So yes, the vast majority of security comes from coinbase rewards. I assume you're implying that ~13% of today's security is not enough? I would love to see any quantitative thoughts you have on how one might determine that. Have there been any thoughts put out in the community as to what size of threat is unlikely enough to arise that we don't need to worry about it? Maybe 1% of the yearly government budgets of the world would be an upper bound on how much anyone would expect could realistically be brought to bear? Today that would be maybe around $350 billion. Or perhaps a better way to estimate would be calculating the size of the motivation of an attacker. For example, this paper seems to conclude that the US government was extracting a maximum of ~$20 billion/year in 1982 dollars (so maybe $60 billion/year in 2022 dollars if you go by CPI). If we scale this up to the entire world of governments, this seems like it would place an upper bound of $180 billion/year of seigniorage extraction that would be at risk if bitcoin might put the currencies they gain seigniorage from out of business. Over 10 years (about as far as we can expect any government to think), that's almost $2 trillion. Whereas it would currently cost probably less than $7 billion to purchase a 50% share of bitcoin miners. To eventually reach a level of $350 billion, bitcoin's price would need to reach about $800,000 / bitcoin. That seems within the realm of possibility. To reach a level of $2 trillion, you'd need a price of $4.3 million/bitcoin. That's still probably within the realm of possibility, but certainly not as likely. If you then assume we won't have significant coinbase rewards by that point, and only 13% of the equivalent revenue (from fees) would be earned, then a price of ~$6 million would be needed to support a $350 billion and $34 million to support a $2 trillion security. I think that second one is getting up towards the realm of impossibility, so if we think that much security is necessary, we might have to rethink things. Its also quite possible, as the network of people who accept and use bitcoin as payment grows, that the fee market will grow superlinearly in comparison to market cap, which would make these kind of high levels of security more realistic. Anyways if it turns out that fees alone don't look like they're supporting enough security, we have a good amount of time to come to that conclusion and do something about it. > Deflation in Bitcoin is not 1:1 matter like in gold, for example... Deflation in Bitcoin is more complex issue It's helpful to keep our language precise here. Price inflation and deflation act identically in bitcoin and gold and anything else. What you seem to be talking about at this point is monetary inflation (specifically, a reduction in it) which of course operates differently on the machinery of bitcoin than it does in the machinery of gold or other things. Whereas my comment about you mentioning Gresham's law was specifically talking about price inflation, not the effects of the coin emission machinery in bitcoin. On Mon, Jan 2, 2023 at 5:02 PM wrote: > > > Right now security comes from almost fully from ~1.8% inflation. > In November mempool was inflated to ~150MB and people were rather waiting > for cheap transactions back. > Instead of being happy that system is closer for a while to default > working area. > > Deflation in Bitcoin is not 1:1 matter like in gold, for example. > If all plain gold available to mine would be finished - gold mines as > unprofitable enterprices are immediately closed. > And it doesn't affect security of gold already in circulation. > In Bitcoin "the show must go on" and someone must pay for it. > Active and passive users together (balanced by market play) or: only > active users (in current scenario, long-term). > > Deflation (or more precisely: tiny inflation) in Bitcoin is more complex > issue with more repercussions than in gold. > In case of drop of network security - the tax will be paid anyway, in > Bitcoin price. > So, there is an self-regulating mechanism here. The harsh one, but still. > > > > W dniu 2023-01-02 05:53:57 u=C5=BCytkownik Billy Tetrud > napisa=C5=82: > > is surely better than not delaying it. > > I might agree, but I don't think it really solves the problem well enough > to be worth it. Any solution that would solve the problem better would ma= ke > delaying halvings unnecessary. > > > there is non-zero risk that people will hoard it more and more, > according to old Gresham's law > > > Gresham's law doesn't apply here. Gresham's law is about the interaction > between two currencies with a fixed, usually government-enforced exchange > rate. You seem to be saying that Bitcoin will be hoarded because Bitcoin > inflation reduces every halving. But even with 0 inflation, it certainly > won't cause all Bitcoin to be hoarded. Also, "hoarding" is also known as > "saving", and there's nothing wrong with saving. The spectre of deflation > comes from a misunderstanding of deflation and why it happens during bad > economic times. It is an effect, not a cause. > > > On Sun, Jan 1, 2023, 15:23 wrote: > > Yes, the idea is: > if mining activity is growing - let's execute consecutive halvings > but if miner exodus has happened - let's delay next halving until mining > activity is recovered to previous levels > > If it gets to the point where a sudden drop in mining difficulty happens = - > delaying the next halving may be not sufficient to correct, but is surely > better than not delaying it. > > While Bitcoin is better and better money with every halving in comparisio= n > to other types of money - there is non-zero risk that people will hoard i= t > more and more, according to old Gresham's law ("HODL"). And this way > decreasing liquidity / transactions volume. The positive feedback loop - = is > my real concern here. > > Regarding the relationship between difficulty and security - I fully agre= e. > But ASIC technology is already matured. And also any technology > breakthrough is a short event within 4 years period. > So growth of difficulty could be gained by technology breakthrough, but > any sudden drop of difficulty would be always an issue, while there is no > such thing as: ASIC technology regression. > > Obviously, not complicated solution would be better than complicated one. > > > > > W dniu 2022-12-30 19:21:10 u=C5=BCytkownik Billy Tetrud > napisa=C5=82: > If the idea is to ensure that a catastrophic miner exodus doesn't happen, > the "difference" you're calculating should only care about downward > differences. Upward differences indicate more mining activity and so > shouldn't cause a halving skip. > > > But I don't think any scheme like this that only acts on the basis of > difficulty will be sufficient. If it gets to the point where a sudden dro= p > in mining difficulty happens, it is very likely that simply delaying the > next halving or even ending halving all together will not be sufficient t= o > correct for whatever is causing hashrate to tank. There is also the dange= r > of simple difficulty stagnation, which this mechanism wouldn't detect. > > > The relationship between difficulty and security becomes less and less > predictable the longer you want to look ahead. There's no long term > relation between difficulty and any reasonable security target. A securit= y > target might be something like "no colluding group with less than $1 > trillion dollars at their disposal could successfully 51% attack the > network (with a probability of blah blah)". There is no way to today > program in any code that detects based on difficult alone when that > criteria is violated. You would have to program in assumptions about the > cost of hashrate projected into the future. > > > I can't think of any robust automatic way to do this. I think to a certai= n > degree, it will have to be a change that happens in a fork of some kind > (soft or hard) periodically (every 10 years? 30 years?). The basic > relations needed is really the cost in Bitcoin of the security target (ie > the minimum number of Bitcoin it should take to 51% attack the system) an= d > the cost in Bitcoin of acquiring a unit of hashrate. This could be simply > input into the code, or could use some complicated oracle system. But wit= h > that relation, the system could be programmed to calculate the difficulty > necessary to keep the system secure. > > > Once that is in place, the system could automatically adjust the subsidy > up or down to attract more or less miners, or it could adjust the block > size up or down to change the fee market such that more or less total fee= s > are collected each block to attract more or less miners. > > > On Tue, Dec 27, 2022, 09:41 Jaroslaw via bitcoin-dev < > bitcoin-dev@lists.linuxfoundation.org> wrote: > > It seems like the more elegant solution could be by using a chainwork > parameter instead. > i.e. comparison just before halving - if the last 210,000 block interval > has a higher chainwork difference between the begining and the end of > interval > than any other such inter-halving interval before. > > LIttle digression yet: > A system in which all users participate in ensuring its security looks > better than one in which only some (i.e. active) of them participate (and > passive stakeholders are de facto free riders) > In my opinion this concept above is only the complement of currently > missing mechanism: achieving equilibrium regarding costs of security > between two parties with opposing interests. > It's easy to understand and - most important - it has no hardcoded value > of tail emission - what is the clear proof it is based on a free market. > And last but not least, if someone is 100% sure that income from > transactions will takeover security support from block subsidy - acceptin= g > such proposal is like putting the money where the mouth is: this safety > measure will never be triggered, then (no risk of fork) > > > Best Regards > Jaroslaw > > > > W dniu 2022-12-23 20:29:20 u=C5=BCytkownik Jaroslaw via bitcoin-dev < > bitcoin-dev@lists.linuxfoundation.org> napisa=C5=82: > > > Necessary or not - it doesn't hurt to plan the robust model, just in case= . > The proposal is: > > Let every 210,000 the code calculate the average difficulty of 100 last > retargets (100 fit well in 210,000 / 2016 =3D 104.166) > and compare with the maximum of all such values calculated before, every > 210,000 blocks: > > > if average_diff_of_last_100_retargets > > maximum_of_all_previous_average_diffs > do halving > else > do nothing > > > This way: > > 1. system cannot be played > 2. only in case of destructive halving: system waits for the recovery of > network security > > > Best Regards > Jaroslaw > _______________________________________________ > bitcoin-dev mailing list > bitcoin-dev@lists.linuxfoundation.org > https://lists.linuxfoundation.org/mailman/listinfo/bitcoin-dev > > > > _______________________________________________ > bitcoin-dev mailing list > bitcoin-dev@lists.linuxfoundation.org > https://lists.linuxfoundation.org/mailman/listinfo/bitcoin-dev > > > --00000000000062c35105f1725315 Content-Type: text/html; charset="UTF-8" Content-Transfer-Encoding: quoted-printable
> In Bitcoin "the show must go on" = and someone must pay for it. Active [and/or] passive users=C2=A0
=
I certainly=C2=A0agree.=C2=A0

> = or more precisely: tiny inflation

=F0=9F=91=8D

> Right now security comes from almost fully= from ~1.8% inflation.

Best I could find, fees make up = about 13% of miner revenue. So yes, the vas= t majority of security comes from coinbase rewards. I assume you're imp= lying that ~13% of today's security is not enough? I would love to see = any quantitative=C2=A0thoughts you have on how one might determine that.=C2= =A0

Have there been any thoughts put out in the communit= y as to what size of threat is unlikely enough to arise=C2=A0that we don= 9;t need to worry about it? Maybe 1% of the yearly=C2=A0government budgets=C2=A0of the world=C2=A0would be an upper bound = on how much anyone would expect could realistically be brought to bear? Tod= ay that would be maybe around $350 billion.=C2=A0

= Or perhaps a better way to estimate would be calculating the size of the mo= tivation of an attacker. For example, this paper=C2=A0seems to conclude that the US government = was extracting a maximum of ~$20 billion/year in 1982 dollars (so maybe $60= billion/year in 2022 dollars if you go by CPI). If we scale this up to the= entire world of governments, this seems like it would place an upper bound= of $180 billion/year of seigniorage extraction that would be at risk if bi= tcoin might put the currencies they gain seigniorage from out of business. = Over 10 years (about as far as we can expect any government to think), that= 's almost $2 trillion.=C2=A0

Whereas it would = currently cost probably less than $7 billion=C2=A0to purchase a 50% share o= f bitcoin miners. To eventually reach a level of $350 billion, bitcoin'= s price would need to reach about $800,000 / bitcoin. That seems within the= realm of possibility. To reach a level of $2 trillion, you'd need a pr= ice of $4.3 million/bitcoin. That's still probably within the realm of = possibility, but certainly not as likely.=C2=A0 If you then assume we won't have significant coinbase rewards by that p= oint, and only 13% of the equivalent revenue (from fees) would be earned, t= hen a price of ~$6 million would be needed to support a $350 billion and $3= 4 million to support a $2 trillion security. I think that second one is get= ting up towards the realm of impossibility, so if we think that much securi= ty is necessary, we might have to rethink things. Its also quite possible, = as the network of people who accept and use bitcoin as payment grows, that = the fee market will grow superlinearly in comparison to market cap, which w= ould make these kind of high levels of security more realistic.=C2=A0
=

Anyways if it turns out that fees alone don't = look like they're supporting enough security, we have a good amount of = time to come to that conclusion and do something about it.=C2=A0

> Deflation in Bitcoin is not 1:1 matter like in go= ld, for example...=C2=A0 Deflation in Bitcoin is more complex issue

It's helpf= ul to keep our language precise here. Price inflation and deflation act ide= ntically in bitcoin and gold and anything else. What you seem to be talking= about at this point is monetary inflation (specifically, a reduction in it= ) which of course operates differently on the machinery of bitcoin than it = does in the machinery of gold or other things. Whereas my comment about you= mentioning Gresham's law was specifically talking about price inflatio= n, not the effects of the coin emission machinery in bitcoin.=C2=A0

On= Mon, Jan 2, 2023 at 5:02 PM <jk_14@op.pl> wrote:


Right now security comes from almost fully from ~1.8% inflation.
In November mempool was inflated to ~150MB and people were rather waiting f= or cheap transactions back.
Instead of being happy that system is closer for a while to default working= area.

Deflation in Bitcoin is not 1:1 matter like in gold, for example.
If all plain gold available to mine would be finished - gold mines as unpro= fitable enterprices are immediately closed.
And it doesn't affect security of gold already in circulation.
In Bitcoin "the show must go on" and someone must pay for it.
Active and passive users together (balanced by market play) or: only active= users (in current scenario, long-term).

Deflation (or more precisely: tiny inflation) in Bitcoin is more complex is= sue with more repercussions than in gold.
In case of drop of network security - the tax will be paid anyway, in Bitco= in price.
So, there is an self-regulating mechanism here. The harsh one, but still.


W dniu 2023-01-02 05:53:57 u=C5=BCytkownik Billy Tetrud <billy.tetrud@gmail.com>= napisa=C5=82:
>=C2=A0is surely better than not delaying it.
=C2=A0
I might agree, but I don't think it really solves the problem well enou= gh to be worth it. Any solution that would solve the problem better would m= ake delaying halvings unnecessary.=C2=A0
=C2=A0
>=C2=A0there is non-zero risk that people will hoard it more and more, a= ccording to old Gresham's law


Gresham's law doesn't apply here. Gresham's law is about the in= teraction between two currencies with a fixed, usually government-enforced = exchange rate. You seem to be saying that Bitcoin will be hoarded because B= itcoin inflation reduces every halving. But even with 0 inflation, it certa= inly won't cause all Bitcoin to be hoarded. Also, "hoarding" = is also known as "saving", and there's nothing wrong with sav= ing. The spectre of deflation comes from a misunderstanding of deflation an= d why it happens during bad economic times. It is an effect, not a cause.

On Sun, Jan 1, 2023, 15:23 <jk_14@op.pl> wrote:

Yes, the idea is:
if mining activity is growing - let's execute consecutive halvings
but if miner exodus has happened - let's delay next halving until minin= g activity is recovered to previous levels

If it gets to the point where a sudden drop in mining difficulty happens - = delaying the next halving may be not sufficient to correct, but is surely b= etter than not delaying it.

While Bitcoin is better and better money with every halving in comparision = to other types of money - there is non-zero risk that people will hoard it = more and more, according to old Gresham's law ("HODL"). And t= his way decreasing liquidity / transactions volume. The positive feedback l= oop - is my real concern here.

Regarding the relationship between difficulty and security - I fully agree.=
But ASIC technology is already matured. And also any technology breakthroug= h is a short event within 4 years period.
So growth of difficulty could be gained by technology breakthrough, but any= sudden drop of difficulty would be always an issue, while there is no such= thing as: ASIC technology regression.

Obviously, not complicated solution would be better than complicated one.



W dniu 2022-12-30 19:21:10 u=C5=BCytkownik Billy Tetrud <billy.tetrud@gmail.com>= napisa=C5=82:
If the idea is to ensure that a catastrophic miner exodus doesn't happe= n, the "difference" you're calculating should only care about= downward differences. Upward differences indicate more mining activity and= so shouldn't cause a halving skip.


But I don't think any scheme like this that only acts on the basis of d= ifficulty will be sufficient. If it gets to the point where a sudden drop i= n mining difficulty happens, it is very likely that simply delaying the nex= t halving or even ending halving all together will not be sufficient to cor= rect for whatever is causing hashrate to tank. There is also the danger of = simple difficulty stagnation, which this mechanism wouldn't detect.=C2= =A0


The relationship between difficulty and security becomes less and less pred= ictable the longer you want to look ahead. There's no long term relatio= n between difficulty and any reasonable security target. A security target = might be something like "no colluding group with less than $1 trillion= dollars at their disposal could successfully 51% attack the network (with = a probability of blah blah)". There is no way to today program in any = code that detects based on difficult alone when that criteria is violated. = You would have to program in assumptions about the cost of hashrate project= ed into the future.


I can't think of any robust automatic way to do this. I think to a cert= ain degree, it will have to be a change that happens in a fork of some kind= (soft or hard) periodically (every 10 years? 30 years?). The basic relatio= ns needed is really the cost in Bitcoin of the security target (ie the mini= mum number of Bitcoin it should take to 51% attack the system) and the cost= in Bitcoin of acquiring a unit of hashrate. This could be simply input int= o the code, or could use some complicated oracle system. But with that rela= tion, the system could be programmed to calculate the difficulty necessary = to keep the system secure.


Once that is in place, the system could automatically adjust the subsidy up= or down to attract more or less miners, or it could adjust the block size = up or down to change the fee market such that more or less total fees are c= ollected each block to attract more or less miners.=C2=A0


On Tue, Dec 27, 2022, 09:41 Jaroslaw via bitcoin-dev <bitcoin-dev@lists.= linuxfoundation.org> wrote:

It seems like the more elegant solution could be by using a chainwork param= eter instead.
i.e. comparison just before halving - if the last 210,000 block interval ha= s a higher chainwork difference between the begining and the end of interva= l
than any other such inter-halving interval before.

LIttle digression yet:
A system in which all users participate in ensuring its security looks bett= er than one in which only some (i.e. active) of them participate (and passi= ve stakeholders are de facto free riders)
In my opinion this concept above is only the complement of currently missin= g mechanism: achieving equilibrium regarding costs of security between two = parties with opposing interests.
It's easy to understand and - most important - it has no hardcoded valu= e of tail emission - what is the clear proof it is based on a free market.<= br> And last but not least, if someone is 100% sure that income from transactio= ns will takeover security support from block subsidy - accepting such propo= sal is like putting the money where the mouth is: this safety measure will = never be triggered, then (no risk of fork)


Best Regards
Jaroslaw



W dniu 2022-12-23 20:29:20 u=C5=BCytkownik Jaroslaw via bitcoin-dev <bit= coin-dev@lists.linuxfoundation.org> napisa=C5=82:
>
Necessary or not - it doesn't hurt to plan the robust model, just in ca= se. The proposal is:

Let every 210,000 the code calculate the average difficulty of 100 last ret= argets (100 fit well in 210,000 / 2016 =3D 104.166)
and compare with the maximum of all such values calculated before, every 21= 0,000 blocks:


if average_diff_of_last_100_retargets > maximum_of_all_previous_average_= diffs
=C2=A0 =C2=A0 =C2=A0 =C2=A0 do halving
else
=C2=A0 =C2=A0 =C2=A0 =C2=A0 do nothing


This way:

1. system cannot be played
2. only in case of destructive halving: system waits for the recovery of ne= twork security


Best Regards
Jaroslaw
_______________________________________________
bitcoin-dev mailing list
= bitcoin-dev@lists.linuxfoundation.org
https://lists.linuxfoundation.org/mail= man/listinfo/bitcoin-dev



_______________________________________________
bitcoin-dev mailing list
= bitcoin-dev@lists.linuxfoundation.org
https://lists.linuxfoundation.org/mail= man/listinfo/bitcoin-dev


--00000000000062c35105f1725315--