1
General Discussion / Re: IOTA + Bitshares
« on: October 31, 2015, 04:07:00 pm »What is oracle?
Something that tells facts happened outside of tangle/blockchain.
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
What is oracle?
Does the DAG get pruned? Do transactions have inputs and outputs similar to Bitcoin?
Who will do the pow work?
If there is no mining, how can the node benifit from runing a pow node?
Or it is not decentralised?
Basiclly, can you tell how many roles there and how they act and why they join.
Yep but if the 3rd party deal with the micro payment, you don't need to have a lot a funds there
A third party could support micropayments by keeping track of them on their own IOU system, and then only transferring once the total reaches a certain limit. This would be similar to how most bitcoin faucets and faucet wallets work, like microwallet, faucetbox, etc.
guess CFB is creating a new comparsion chart for major 2.0 chains!
If so, it would be great u would post it here before publishing for reviewing ..
.. which, however, is just a denial of service and not disruptive for the network
Suggestions for improvement are always welcome.
https://github.com/BitShares/bitshares/blob/ee44418782f1b519480ddab7eb845b0612a99498/libraries/client/include/bts/client/seed_nodes.hpp
Provided by volunteers and delegates. I encourage everyone to help!
Initially the clients connect to a random subset of seed nodes.
So after 3 weeks the delegated forging power is taken away from the forging pool again and the one that delegated the forging power would have to renew his vote if his forging power should not be "wasted"?
Furthermore, I do not see how this Economic Clustering completely solves the Nothing-at-Stake problem as you claim in your post. The attacker producing the fake blockchain can simply remove everyone else's transactions from their fake blockchain and include their own transactions between sockpuppets to make it appear that the fake blockchain is valid. If they are able to trick the user onto that chain, they could then carry out the double-spend attack. The only problem for the attacker is if the victim is recovering an existing account where they have already made outgoing transactions to people that they expect to see in their transaction history (that is something that cannot be faked by the attacker). Even incoming transactions can be faked if the fake blockchain starts far enough in the past such that the parties that sent the victim the funds had not yet registered their account names on the blockchain (assuming the victim had not pinned the BTS public keys of their contacts in a wallet backup of course).