2. Proof of Work and Mining

Поделиться
HTML-код
  • Опубликовано: 28 ноя 2024

Комментарии •

  • @trent797
    @trent797 2 года назад +11

    28:43 For those who are not getting the same result when using online sha256 tools, the echo command is adding a newline character to the output, so the text isn't just what is in the quotes. If you write his command using echo -n, you will get the same result as online tools.

  • @kolmercm
    @kolmercm 5 лет назад +9

    Great lecture series so far!

  • @AntonMiasnikov
    @AntonMiasnikov 3 года назад +5

    59:00 hello from 2021. not CAN. it DOES affect markets.

  • @danielmescheder8153
    @danielmescheder8153 2 года назад +5

    I'm wondering the following about "useful proof of work": Isn't the entire point of proof of work to attach an economic cost to mining? Mining costs electricity and the miner is compensated through the coinbase transaction. That makes complying with the network a net positive operation but makes misbehaving very expensive. If proof of work had some secondary use, the miner could "sell" the result of that computation making the mining process less costly which would defeat the purpose. What am I missing?

    • @radubutucelea
      @radubutucelea 2 года назад

      I think you summarized it right.

  • @copytrader
    @copytrader 3 года назад +4

    This is all equivocation to me!

  • @richs.3863
    @richs.3863 3 года назад +7

    Lol. The change in contrast (49:06) when he says "Got the money... got the money. Oh shoot I don't have the money any more"

  • @FelipeFigueroaG
    @FelipeFigueroaG 3 года назад +1

    The dramatic zoom at 1:11:21
    *chef's kiss*

  • @TeshTube
    @TeshTube 2 года назад +2

    Neha is epic! Learned a ton! Thank you :)

  • @cicero1930
    @cicero1930 5 лет назад +4

    The electricity usage is a pro

  • @manojvits
    @manojvits 3 года назад +4

    Great Lecture !!! THANK YOU!

  • @abdulazeemshaik7112
    @abdulazeemshaik7112 Год назад

    Did anyone understand the synchronous and the asynchronous part of the byzantine tolerance system?
    [ Doubt asked by a member of the audience ]
    14:00

  • @codefast93
    @codefast93 2 года назад +1

    This course is amazing!

  • @JoseHenrique-db5ws
    @JoseHenrique-db5ws 2 года назад +2

    Can someone better explain to me (or give me a link) why submitting only close hashes but never a good one is a sneaky attack? (1:21:30). Thank you :)

    • @nayuki2020
      @nayuki2020 Год назад

      it's called a BWH attack

  • @bariswheel
    @bariswheel 3 года назад +4

    Great lecture thank you for posting !

  • @sandeshbme
    @sandeshbme 3 года назад +9

    22:23 A time traveler wearing a mask on the first row in audience 😱

    • @alexandermurphy60
      @alexandermurphy60 3 года назад

      Certain places have had a culture of wearing a mask while sick for some time before covid. Now we've all learned!

    • @sandeshbme
      @sandeshbme 3 года назад +1

      @@alexandermurphy60 it's a joke dude, nothing serious !!!

    • @Francesco-cj3oi
      @Francesco-cj3oi 3 года назад

      @@alexandermurphy60 lol so stupid

  • @Goldie2110
    @Goldie2110 3 года назад +1

    Need more technical analysis of cryptocurrency and blockchain technology

  • @dumaoctavian8523
    @dumaoctavian8523 2 года назад

    Does anyone have a video showing how did they do the homework? Seems a bit difficult for me.

  • @embenz7
    @embenz7 3 года назад +2

    Great explanation!

  • @schmulygluck4905
    @schmulygluck4905 3 года назад +1

    Question: all a 51 percent attacker would need to do would be to do his fraudulent transaction and rewrite the chain for a few blocks. After that all the other nodes would pick up from his longest chains. Correct? Meaning he wouldnt need to have 51 percent of the computing power forever- rather just long enough so that the rest of the network goes with it... is that right?

    • @mr-boo
      @mr-boo 3 года назад +1

      That's correct, after the fork becomes accepted, you could drop your compute power. There's no need to hold on, unless there's an adversarial party trying to fork you too :)
      On the notion of "holding on for few blocks": Do note that 51% only makes you marginally faster, and that it is still a stochastic process. Your next malignly placed fork might just happen to be one of those blocks that take an hour to compute while the benign people get a few lucky blocks, then you need to catch up with that with only a marginal speed difference. So there's still a reasonable chance that targeting the replacement of even a recent block requires pushing your own fork alone for many blocks, when the edge over the rest is that small. Of course, an attacked could get lucky too, and with a little more luck, they could succeed at a reorg even at

    • @RichardBoase
      @RichardBoase 2 года назад

      For 100 blocks. There's a maturity period before a block producer gets paid for their Proof of Work. So they'd have to win 100 more blocks without the network orphaning them.

  • @cizeralex9373
    @cizeralex9373 5 лет назад +2

    Hello.... Its great lesson but you didn't discuss from where the zero date get the output cycle to enroll for the first boot class sector..?!!!

  • @johnjurkiewicz6460
    @johnjurkiewicz6460 4 года назад +1

    1:17:00 quoted NBC as having 110 employees in stl. New year's sighing off.

  • @buckfush187
    @buckfush187 2 года назад

    28:32 how is 8 zeros 4 bytes. What are the 4 bytes he is referring to?

    • @amirphl7834
      @amirphl7834 2 года назад

      In hex format, each number represent 4 bits. Starts from 0 and ends with F. Therefore, 8 zeros represent 32 bits = 4 bytes.

  • @bjarke7886
    @bjarke7886 5 лет назад +1

    This was pretty good

  • @ds-mi4od
    @ds-mi4od 3 года назад

    Tadge 14:45

  • @jagelves
    @jagelves 2 года назад

    Poisson or Exponential?

    • @jagelves
      @jagelves Год назад

      @@josephvanname3377 Right. The slide said Poisson, however, it gives the average time to produce the next block. 10 min.

  • @damircicic
    @damircicic 2 года назад +1

    I wish the lady did the entire lecture, she is much more easy to follow.

  • @derked6914
    @derked6914 3 года назад +2

    I'm losing my mind here trying to replicate the hash at 28:59 online with a basic sha256 online tool and getting a completely different hash output... am i missing something?

    • @jalexisg
      @jalexisg 3 года назад

      Same issue trying to replicate the examples of first lecture. Don’t match using sha256.

    • @trent797
      @trent797 2 года назад +2

      On his mac, it is inserting a newline. If you put -n in the echo command to strip the newline, you will get the same result as online tools.

  • @muhammadsalman6746
    @muhammadsalman6746 3 года назад

    awesome

  • @RichardBoase
    @RichardBoase 2 года назад

    PoW deanonymises nodes on a public network by design

  • @lowelovibes8035
    @lowelovibes8035 3 года назад

    not clear

  • @RiccardoVincelli
    @RiccardoVincelli Год назад

    Neha Narula keeps reusing unlicensed imagery 😂

  • @shrikantpangale5520
    @shrikantpangale5520 3 года назад +1

    1:54 how the hell did that guy in cap wore a mask in Spring 2018 ...when covid outbreak happened in Jan2020 in U.S.

    • @AB-mx9lx
      @AB-mx9lx 3 года назад +1

      error in the matrix....

  • @DeAngeloYouKnow
    @DeAngeloYouKnow 5 лет назад +5

    Someone reply to this comment in june 2021 and ask me how my life is going.

    • @kamashioh4236
      @kamashioh4236 5 лет назад +1

      how life

    • @thethreeheadedmonkey
      @thethreeheadedmonkey 5 лет назад +6

      @@kamashioh4236 I feel like you should probably learn how to tell time before watching a lecture series from MIT on cryptocurrencies.

    • @DeAngeloYouKnow
      @DeAngeloYouKnow 5 лет назад

      @@thethreeheadedmonkey ahahhah

    • @abdullahh283
      @abdullahh283 5 лет назад +4

      @@thethreeheadedmonkey maybe the hash he's using got it all wrong? lol

    • @poshchief6735
      @poshchief6735 4 года назад

      Since now nothing going good 😞

  • @isheep225
    @isheep225 2 года назад +3

    You know MIT is full of precursor when one of the students at the front of the classroom uses a face mask in 2019

  • @vib_di
    @vib_di 3 года назад

    Its all worthless now.

  • @iblard
    @iblard 5 лет назад +3

    Awful slides.

    • @tgifllc
      @tgifllc 3 года назад +2

      I love the slides. They are easy to read, no distracting graphics, and the dark background doesn't burn my eyes watching it at night. You can tell he's a programmer with slides like these.