"Master, many small mining coins are very popular recently. What do you think about me going to Zhongguancun to assemble a machine for mining?" The symbol of gold coins flickered in the soldier's eyes. "If it is an early mining coin, it is safe to speculate in the short term. But in the long run, individual mining is meaningless." "Why? Isn't it true 'decentralization' only when mining is done by individuals?" the soldier was puzzled. "Let me ask you, is it more advanced, the United States where 2% of the agricultural population feeds the country, or India where 70% of the agricultural population feeds the country? In your eyes, India's agricultural model is fully 'decentralized'." I looked at him with a hint of sarcasm. Recently, many PoW small mining coins have suddenly emerged, and their prices have increased several times or even dozens of times in the past few months. At first glance, the hype seems to be very hot, but there may be hidden risks. These small mining coins usually have the following characteristics: 1. Anti-ASIC, even anti-GPU 2. Anonymity 3. High TPS 4. Smart contract + DApp platform The ultimate goal of these small mining coins is to become the next Dogecoin. It is an unintentional creation that even the creator himself jokingly calls a joke and is publicly stated by many blockchain "bigwigs" to be "worthless", but it has relied on the power of the grassroots to occupy the top 50 position in the cryptocurrency market value ranking for many years . Almost all popular small mining coins have the essential feature of being ASIC-resistant , and some are even GPU-resistant. This is achieved through the following methods: 1. Consensus algorithm. Common ones include X11, X22i, X16R, and Cryptonight Lite. It resists ASIC mining machines by interrupting the serial order of hash algorithms. Today, I will try to talk about the possible future development trends of PoW from the perspective of a network engineer, combined with two recent events in the company. 01Is anti-ASIC necessarily right?Let me start with the first thing. In the recent weekly meeting, everyone talked about a phenomenon: some customers' devices were implanted with Trojans, which did not cause any major harm, because the only function of these Trojans was to use the processors and memory of these devices to mine cryptocurrencies. What coins are being mined? Of course not Bitcoin or Ethereum, because the computing power of these devices is too small compared to the computing power of the entire Bitcoin or Ethereum network, and they cannot mine at all. This leads to a question. If a currency with a PoW consensus algorithm is as popular as Bitcoin and achieves the so-called ideal "decentralization", how many "home miners" do you think will run their computers and mine 24 hours a day? 1 million or more? How many "zombie hosts" (hosts or network devices controlled by hackers due to network viruses) are there in the hands of hackers around the world? According to relevant statistics, the number was 6.7 million in 2016. With the popularization of electronic devices such as smartphones, 5G networks, and the Internet of Things, it should not be surprising that this number will reach tens of millions or even hundreds of millions in the next few years. If Bitcoin is a network of 1 million home miners, it is very likely that several large hacker groups can easily launch a 51% attack on Bitcoin by joining forces. Why haven’t the current small mining coins been attacked by hackers? Maybe the market value is too small to be noticed by hackers, maybe the profit from the attack is not high enough, or there may be other reasons. But in any case, any so-called "anti-ASIC" PoW mining coin actually exposes itself to the "covetous eyes" of millions of zombie hosts. There is always the risk of being attacked by hackers using numerous zombie hosts. On the other hand, for ASIC, whether it is BTC, BCH or BSV, although most of their computing power is controlled by the top mining pools, it seems that they are highly centralized; but the computing power of an ASIC mining machine is equivalent to hundreds of thousands of CPUs. In other words, an inconspicuous ASIC mining machine can match the computing power of hundreds of thousands of zombie hosts , and a mining farm with tens of thousands of ASIC mining machines cannot be matched even if hackers unite and mobilize all zombie hosts, let alone use this little computing power to fight against the computing power of the entire Bitcoin or Bitcoin Cash network. For PoW, security is the most important thing. Furthermore, from another perspective, if a currency with a PoW consensus algorithm is as popular as Bitcoin, then: 1. If the algorithm is ASIC-resistant, ASIC mining machines for this algorithm may be developed slowly. 2. If it uses memory or hard disk, large disk arrays, or dedicated large memory hosts, it will definitely beat home computers in terms of efficiency. 3. Even if we simply ignore factors 1 and 2, concentrating machines in data centers, where electricity is cheap, will always be much more cost-effective than home PCs. In the long run, computing power (whether CPU, memory, or hard disk) will always tend to be centralized, just like the current BTC three brothers. After all, PoW, Proof of Work, represents free capitalism. The essence of the competition of computing power is the competition of capital. Family workshops are always so powerless when facing industrial assembly lines. If you agree that PoW is free capitalism, then PoS (Proof of Stake) is a competition within a closed system like a hereditary aristocracy, and it is clear at a glance which one is better. 02Internet protocol upgrade and beneficial block expansion?Now let's talk about the second thing. The IPv4 address pool that the company can allocate to users is almost exhausted. The current address pool reserve may only last for about 2 to 3 years. The above sentence sounds quite hardcore, so I will try to translate it into plain language. Simply put, on the Internet, communication between devices is based on something called an IP address. The current version number is v4, so it is also called IPv4. What does it look like? For example, "192.168.1.1". What does an IP represent? It's very simple, just like the house number on the Internet . When we buy things on Taobao, we need to fill in the home or company address. Computers also need these "Internet house numbers" to send messages to each other. For example, if your home IP is 21.33.13.5, it is similar to "No. 18, Sanlitun, Beijing, China". IPv4 has less than 4 billion available addresses in total. It was originally estimated that they would be used up before 2010, after all, the number of network devices in the world has long exceeded this number. However, with the support of various technologies, it has survived to this day. The most common one is NAT, also known as address translation. What does this thing do? It is equivalent to an old man in the message room. When the express is delivered to "No. 18, Sanlitun, Beijing, China", it will be handed over to this old man, who will then deliver the item to a specific person, because there may be N units and many buildings in No. 18, and different people live in each building. A company, a family, or an Internet cafe basically only shares one real public IP address , which is placed on the exit router. The devices inside all use private, or internal IP addresses, such as "Unit 3, Building 5, 401, Five Fireballs Master". The router is like the old man in the message room. Almost every entrance to the network has such an old man to help pass the message to the specific person, thus saving a lot of IP addresses. However, no matter how much we save, we finally run out of IPv6. The IPv6 protocol, which was developed 20 years ago, has finally come into use. Last year, the company had its first and second commercial users since its founding, who asked for IPv6 addresses and support. We believe that in the next two years, there will be more and more such customers. It is expected that in three years, our company will face the embarrassing situation of either forcing customers to use IPv6 or purchasing the few remaining IPv4 addresses on the market at a high price. What is IPv6? It is the next generation protocol of IPv4 and looks like this: “2001:0db8:85a3:0000:0000:8a2e:0370:7334”. This thing looks very anti-human, but it can provide addresses of 2 to the power of 128, which is more than enough to assign an IPv6 address to every grain of sand on the earth. With IPv6, the "mailroom uncle" will be laid off! The address of each device on the Internet is in a similar format as "No. 18, Unit 3, Building 5, 401, Sanlitun, Beijing, China". Express delivery can be delivered directly to individuals, and there is no need to go through the mailroom anymore. Having said so much, what does this have to do with blockchain, or PoW, or even Bitcoin? There are at least two points: First, at this stage, hackers randomly scan an IPv4 network segment, such as tens of thousands of addresses, which may take several hours to complete. Then, based on the scan results, they can see which machines have vulnerabilities and can be attacked, and install viruses or Trojans. The first step in implementing an attack is usually scanning. But the IPv6 network is too large! At the current scanning speed, it takes much longer to scan a network segment, which may contain hundreds of millions or even billions of addresses, than IPv4. As a result, the time and cost of finding new zombie hosts will be greatly increased, which is a big benefit to network security. Second, when CSW (domestic users jokingly call him Ao Bencong) introduced BSV's Metanet, he mentioned the issue of IPv6 separately. He said that IPv6 can be directly integrated into BTC or BSV. This has the following benefits: 1. IPv6 addresses can be allocated directly through Bitcoin payments. In this case, network attackers must deposit a deposit in advance, and they can only get the money back if they follow the rules; if they violate the rules in any way, the money will be lost. In short, if a device wants to access the Internet smoothly, it must first get an IPv6 address, and getting the address requires automatically paying a little Bitcoin as a deposit. If it doesn't behave, the deposit will be gone. In short, IPv6 will gradually become mainstream in the next 3-5 years, and will have a significant impact on many protocols, designs, security, etc. on the Internet. The blockchain layer attached to the Internet, especially the PoW consensus algorithm, will also undergo corresponding changes. At present, it will develop in a good direction , and the integration of IPv6 and Bitcoin mentioned by CSW is even more exciting. Let's wait and see what changes IPv6 will bring to the blockchain! What do you think are the pros and cons of anti-ASIC mining? Feel free to leave your opinions in the comment section. ——End—— " Disclaimer : The article is the author's independent opinion and does not represent the position of Vernacular Blockchain, nor does it constitute any investment opinion or suggestion. " Original: Five Fireballs Source: Vernacular Blockchain (https://mp.weixin.qq.com/s/OWyIC-7OMNnfS7rAPR4KGw) |
Chapter 0 Introduction The Bitcoin block size dis...
On September 14, a reporter from China Business N...
In life, it is inevitable that people will meet so...
Bitcoin Core has announced a new sponsorship prog...
There are twelve palaces in facial features. Diff...
At 9 pm on January 5, WaykiChain officially enter...
Banking giants including JPMorgan Chase, Citigrou...
Hairstyle hinders your luck Everyone pays attenti...
The wisdom line, as the name suggests, represents...
A blessed face can bring good luck and wealth to p...
The wisdom line is very long and extends to the w...
Everyone has moles on their body to a greater or ...
Earlier this month, the governor and two deputy g...
Recently, Bitbays (www.bitbays.com), a dual-curre...
Everyone hopes to have a good life and be happy, ...