Remix.run Logo
MadnessASAP 4 days ago

Proof-of-Work fails if the work has value.

ssd532 4 days ago | parent [-]

why?

MadnessASAP 3 days ago | parent | next [-]

In Proof-of-Work the cost of the work is what keeps the network honest. If the work has value then an attacker is free to invest as many resources as I want into subverting the network. Even a failed attack can still be profitable, just less so.

In another scenario, where the works value is less then the cost you're still hoping that at no point in the future will an attacker figure out a way to do the work at a net profit.

The only way the network can be trusted is if the work has definitely now and always, 0 value.

chipsrafferty 3 days ago | parent | next [-]

Not littering has value. However, if I don't litter, it doesn't benefit me, and I cannot profit off of it; no matter how eco-friendly I am, I get no value from it.

OldfieldFund 3 days ago | parent | prev [-]

Am I wrong in saying that the work has negative value? And there are different degrees of that. Bitcoin's negative value is larger.

MadnessASAP 3 days ago | parent [-]

You are not wrong, the output has no value. The work then being Value Out - Value In.

red-iron-pine 2 days ago | parent | prev | next [-]

because Proof-of-Work only generates value for an arbitrary, made up coin if it has no other real value.

Otherwise you're making money that way, and the value of the coin is tied to the work that you did.

until recently gold was a pretty but mostly useless metal. too heavy for practical uses, too melty for industrial uses, too soft for weapons, etc. but it didn't rust and was a good medium of exchange because it had no other real value. once it has value outside of being currency it's less useful in that capacity, since now its value is tied to how much you can get for it by utilizing it in computers, chemical reactions, etc.... same basic idea with PoW

4gotunameagain 4 days ago | parent | prev [-]

I don't think it's true, look up Proof of Useful Work

moomin 3 days ago | parent [-]

Which, ironically, is used by the attacker in this case.

OneDeuxTriSeiGo 2 days ago | parent [-]

It's worth noting that lots of projects claim to be "Proofs of Useful Work" without the academic rigor to actually prove so. The attacker of course being one of those who has failed to do so.

1. Their paper has not been accepted by any conference or journal.

2. Neither author on their paper is an academic (or practicing engineer or researcher) in the fields of computer science, economics, game theory, or cryptography (or any maths in general). The one is a C-level exec with what seems to be minimal CS experience and the other is a psychology professor. Neither author appears to have qualifications to be able to assume some level of rigor (before looking at the underlying work).

3. The paper is a bunch of text and buzzwords about AI and AGI intermixed with some academic history and some discussions on psychology. Of the 47 pages of the paper, only about 1-2 pages are semi-technical in major with an additional ~3 pages of code included to show their algorithm. There are two graphs relevant to the protocol on those 1-2 pages and neither one addresses any security aspects, instead showing it's performance at doing the "useful" part. So again to reiterate, their "academic paper" on the security of their PoUW algorithm includes no rigorous analysis of the protocol.

TLDR They aren't doing PoUW. They are doing cooperative compute with a centralised or federated coordinator dishing out rewards.

Proofs of Useful Work do actually exist and are an interesting field but they take a lot of rigor and analysis to be accepted and not immediately ripped to shreds. What the attacker claims is not even close to meeting that bar.