Re: 3. Proof-of-work analysis

2004-06-03 Thread Ben Laurie
Adam Back wrote: Here's a forward of parts of an email I sent to Richard with comments on his and Ben's paper (sent me a pre-print off-list a couple of weeks ago): One obvious comment is that the calculations do not take account of the CAMRAM approach of charging for introductions only. You

Re: [Asrg] Re: 3. Proof-of-work analysis

2004-05-19 Thread Barry Shein
I'm still amazed that anyone takes this proof-of-work/hashcash stuff seriously. At best it's the War Games approach, let's make the server play tic-tac-toe with itself to avoid nuclear holocaust, or the Bill Shatner logical paradox that makes the robot's head blow up. The Sphinx's riddle also

Re: [Asrg] Re: 3. Proof-of-work analysis

2004-05-19 Thread Mark Baugher
At 03:02 PM 5/19/2004, Barry Shein wrote: I'm still amazed that anyone takes this proof-of-work/hashcash stuff seriously. I think it's grounded in some well-accepted DoS defence principles that are found in cookie protocols like Photuris and ISAKMP. Mark At best it's the War Games approach,

Re: 3. Proof-of-work analysis

2004-05-19 Thread Adam Back
Here's a forward of parts of an email I sent to Richard with comments on his and Ben's paper (sent me a pre-print off-list a couple of weeks ago): One obvious comment is that the calculations do not take account of the CAMRAM approach of charging for introductions only. You mention this in the

Re: [Asrg] Re: 3. Proof-of-work analysis

2004-05-19 Thread Barry Shein
I'm still amazed that anyone takes this proof-of-work/hashcash stuff seriously. At best it's the War Games approach, let's make the server play tic-tac-toe with itself to avoid nuclear holocaust, or the Bill Shatner logical paradox that makes the robot's head blow up. The Sphinx's riddle also

Re: [Asrg] Re: 3. Proof-of-work analysis

2004-05-19 Thread Mark Baugher
At 03:02 PM 5/19/2004, Barry Shein wrote: I'm still amazed that anyone takes this proof-of-work/hashcash stuff seriously. I think it's grounded in some well-accepted DoS defence principles that are found in cookie protocols like Photuris and ISAKMP. Mark At best it's the War Games approach,

Re: 3. Proof-of-work analysis

2004-05-18 Thread Adam Back
Here's a forward of parts of an email I sent to Richard with comments on his and Ben's paper (sent me a pre-print off-list a couple of weeks ago): One obvious comment is that the calculations do not take account of the CAMRAM approach of charging for introductions only. You mention this in the