-
Notifications
You must be signed in to change notification settings - Fork 380
Impotent Mining Fallacy
There is a theory that miners have no power. This is distinct from the closely related Proof of Work Fallacy. The theory rests on the assumption that miners are subject to economic pressures that preclude sustained effective attacks. This theory leads people to believe that mining can be strongly pooled as long as merchants are not centralized, as the economy can control the behavior of mining, rendering the system secure. The consequence of this invalid theory is complacency regarding the insecurity caused by pooling.
The theory holds that if majority hash power double-spends then merchants will necessarily increase confirmation depth requirements, increasing the cost of subsequent attacks. At some point an equilibrium is reached where greater depths are considered sufficient for exchange. Given that this would preclude double-spending altogether, there would be no advantage to sustaining the attack. The theory accepts that attacks can happen, but not frequently enough to materially reduce utility.
The theory also holds that a miner cannot avoid selecting the highest fee transactions as this reduces relative reward, enriching other miners. This is presumed to lead to a loss of majority power and therefore an inability to continue. This aspect of the theory implies that miners cannot effectively censor.
The theory also considers that selfish mining by majority hash power is feasible, but in the absence of double spending and censorship, there is no adverse consequence to the economy. In this case the majority simply becomes the one miner as all others are unable to retain rewards. Despite lack of competition, hash rate and fee levels are maintained by the ever-looming possibility of competition.
Yet miners and merchants are trading partners, engaged voluntarily in mutually-beneficial activity. As explored in the Balance of Power Fallacy, neither can control the other and price is the resolution of all preferences. This would seem to support the theory, however the theory does not address the threat, and is actually a red herring. Bitcoin is designed to defend against non-market forces, specifically the state. Market forces are never a threat to the market itself.
The pooling of hash power eviscerates security, as states can simply co-opt it. But states can also build their own mines to the same effect. Bitcoin therefore requires both significant hash power and distribution of that power among people who are willing and able to risk state controls.
The state is an economically rational actor. Inflation is profitable for the issuer. Bitcoin's widespread use would prevent states from effectively levying the inflation tax. State attacks are therefore expected, and analogous attacks are commonplace. It is practically inevitable that states will subsidize attacks, but even the possibility invalidates the theory.
Users | Developers | License | Copyright © 2011-2024 libbitcoin developers
- Home
- manifesto
- libbitcoin.info
- Libbitcoin Institute
- Freenode (IRC)
- Mailing List
- Slack Channel
- Build Libbitcoin
- Comprehensive Overview
- Developer Documentation
- Tutorials (aaronjaramillo)
- Bitcoin Unraveled
-
Cryptoeconomics
- Foreword by Amir Taaki
- Value Proposition
- Axiom of Resistance
- Money Taxonomy
- Pure Bank
- Production and Consumption
- Labor and Leisure
- Custodial Risk Principle
- Dedicated Cost Principle
- Depreciation Principle
- Expression Principle
- Inflation Principle
- Other Means Principle
- Patent Resistance Principle
- Risk Sharing Principle
- Reservation Principle
- Scalability Principle
- Subjective Inflation Principle
- Consolidation Principle
- Fragmentation Principle
- Permissionless Principle
- Public Data Principle
- Social Network Principle
- State Banking Principle
- Substitution Principle
- Cryptodynamic Principles
- Censorship Resistance Property
- Consensus Property
- Stability Property
- Utility Threshold Property
- Zero Sum Property
- Threat Level Paradox
- Miner Business Model
- Qualitative Security Model
- Proximity Premium Flaw
- Variance Discount Flaw
- Centralization Risk
- Pooling Pressure Risk
- ASIC Monopoly Fallacy
- Auditability Fallacy
- Balance of Power Fallacy
- Blockchain Fallacy
- Byproduct Mining Fallacy
- Causation Fallacy
- Cockroach Fallacy
- Credit Expansion Fallacy
- Debt Loop Fallacy
- Decoupled Mining Fallacy
- Dumping Fallacy
- Empty Block Fallacy
- Energy Exhaustion Fallacy
- Energy Store Fallacy
- Energy Waste Fallacy
- Fee Recovery Fallacy
- Genetic Purity Fallacy
- Full Reserve Fallacy
- Halving Fallacy
- Hoarding Fallacy
- Hybrid Mining Fallacy
- Ideal Money Fallacy
- Impotent Mining Fallacy
- Inflation Fallacy
- Inflationary Quality Fallacy
- Jurisdictional Arbitrage Fallacy
- Lunar Fallacy
- Network Effect Fallacy
- Prisoner's Dilemma Fallacy
- Private Key Fallacy
- Proof of Cost Fallacy
- Proof of Memory Façade
- Proof of Stake Fallacy
- Proof of Work Fallacy
- Regression Fallacy
- Relay Fallacy
- Replay Protection Fallacy
- Reserve Currency Fallacy
- Risk Free Return Fallacy
- Scarcity Fallacy
- Selfish Mining Fallacy
- Side Fee Fallacy
- Split Credit Expansion Fallacy
- Stock to Flow Fallacy
- Thin Air Fallacy
- Time Preference Fallacy
- Unlendable Money Fallacy
- Fedcoin Objectives
- Hearn Error
- Collectible Tautology
- Price Estimation
- Savings Relation
- Speculative Consumption
- Spam Misnomer
- Efficiency Paradox
- Split Speculator Dilemma
- Bitcoin Labels
- Brand Arrogation
- Reserve Definition
- Maximalism Definition
- Shitcoin Definition
- Glossary
- Console Applications
- Development Libraries
- Maintainer Information
- Miscellaneous Articles