2. Proof of Work and Mining

Поделиться
HTML-код
  • Опубликовано: 26 авг 2024

Комментарии • 72

  • @trent797
    @trent797 2 года назад +11

    28:43 For those who are not getting the same result when using online sha256 tools, the echo command is adding a newline character to the output, so the text isn't just what is in the quotes. If you write his command using echo -n, you will get the same result as online tools.

  • @danielmescheder8153
    @danielmescheder8153 2 года назад +5

    I'm wondering the following about "useful proof of work": Isn't the entire point of proof of work to attach an economic cost to mining? Mining costs electricity and the miner is compensated through the coinbase transaction. That makes complying with the network a net positive operation but makes misbehaving very expensive. If proof of work had some secondary use, the miner could "sell" the result of that computation making the mining process less costly which would defeat the purpose. What am I missing?

    • @radubutucelea
      @radubutucelea 2 года назад

      I think you summarized it right.

  • @kolmercm
    @kolmercm 5 лет назад +9

    Great lecture series so far!

  • @AntonMiasnikov
    @AntonMiasnikov 3 года назад +5

    59:00 hello from 2021. not CAN. it DOES affect markets.

  • @richs.3863
    @richs.3863 3 года назад +7

    Lol. The change in contrast (49:06) when he says "Got the money... got the money. Oh shoot I don't have the money any more"

  • @copytrader
    @copytrader 3 года назад +4

    This is all equivocation to me!

  • @TeshTube
    @TeshTube 2 года назад +2

    Neha is epic! Learned a ton! Thank you :)

  • @bradleynowacek4820
    @bradleynowacek4820 Год назад +2

    1:11:35 Did he just compare the energy wastage of bitcoin mining to the colonial exploitation of precious metals like that was a defense??? Am I crazy???

  • @manojvits
    @manojvits 3 года назад +4

    Great Lecture !!! THANK YOU!

  • @bariswheel
    @bariswheel 3 года назад +4

    Great lecture thank you for posting !

  • @sandeshbme
    @sandeshbme 3 года назад +9

    22:23 A time traveler wearing a mask on the first row in audience 😱

    • @alexandermurphy60
      @alexandermurphy60 3 года назад

      Certain places have had a culture of wearing a mask while sick for some time before covid. Now we've all learned!

    • @sandeshbme
      @sandeshbme 3 года назад +1

      @@alexandermurphy60 it's a joke dude, nothing serious !!!

    • @Francesco-cj3oi
      @Francesco-cj3oi 2 года назад

      @@alexandermurphy60 lol so stupid

  • @FelipeFigueroaG
    @FelipeFigueroaG 3 года назад +1

    The dramatic zoom at 1:11:21
    *chef's kiss*

  • @estervojkollari4264
    @estervojkollari4264 2 года назад +1

    This course is amazing!

  • @cicero1930
    @cicero1930 5 лет назад +4

    The electricity usage is a pro

  • @Goldie2110
    @Goldie2110 2 года назад +1

    Need more technical analysis of cryptocurrency and blockchain technology

  • @abdulazeemshaik7112
    @abdulazeemshaik7112 9 месяцев назад

    Did anyone understand the synchronous and the asynchronous part of the byzantine tolerance system?
    [ Doubt asked by a member of the audience ]
    14:00

  • @embenz7
    @embenz7 3 года назад +2

    Great explanation!

  • @JoseHenrique-db5ws
    @JoseHenrique-db5ws Год назад +2

    Can someone better explain to me (or give me a link) why submitting only close hashes but never a good one is a sneaky attack? (1:21:30). Thank you :)

    • @nayuki2020
      @nayuki2020 Год назад

      it's called a BWH attack

  • @johnjurkiewicz6460
    @johnjurkiewicz6460 4 года назад +1

    1:17:00 quoted NBC as having 110 employees in stl. New year's sighing off.

  • @bjarke7886
    @bjarke7886 4 года назад +1

    This was pretty good

  • @cizeralex9373
    @cizeralex9373 4 года назад +2

    Hello.... Its great lesson but you didn't discuss from where the zero date get the output cycle to enroll for the first boot class sector..?!!!

  • @schmulygluck4905
    @schmulygluck4905 3 года назад +1

    Question: all a 51 percent attacker would need to do would be to do his fraudulent transaction and rewrite the chain for a few blocks. After that all the other nodes would pick up from his longest chains. Correct? Meaning he wouldnt need to have 51 percent of the computing power forever- rather just long enough so that the rest of the network goes with it... is that right?

    • @mr-boo
      @mr-boo 2 года назад +1

      That's correct, after the fork becomes accepted, you could drop your compute power. There's no need to hold on, unless there's an adversarial party trying to fork you too :)
      On the notion of "holding on for few blocks": Do note that 51% only makes you marginally faster, and that it is still a stochastic process. Your next malignly placed fork might just happen to be one of those blocks that take an hour to compute while the benign people get a few lucky blocks, then you need to catch up with that with only a marginal speed difference. So there's still a reasonable chance that targeting the replacement of even a recent block requires pushing your own fork alone for many blocks, when the edge over the rest is that small. Of course, an attacked could get lucky too, and with a little more luck, they could succeed at a reorg even at

    • @RichardBoase
      @RichardBoase 2 года назад

      For 100 blocks. There's a maturity period before a block producer gets paid for their Proof of Work. So they'd have to win 100 more blocks without the network orphaning them.

  • @dumaoctavian8523
    @dumaoctavian8523 Год назад

    Does anyone have a video showing how did they do the homework? Seems a bit difficult for me.

  • @buckfush187
    @buckfush187 2 года назад

    28:32 how is 8 zeros 4 bytes. What are the 4 bytes he is referring to?

    • @amirphl7834
      @amirphl7834 Год назад

      In hex format, each number represent 4 bits. Starts from 0 and ends with F. Therefore, 8 zeros represent 32 bits = 4 bytes.

  • @muhammadsalman6746
    @muhammadsalman6746 2 года назад

    awesome

  • @derked6914
    @derked6914 3 года назад +2

    I'm losing my mind here trying to replicate the hash at 28:59 online with a basic sha256 online tool and getting a completely different hash output... am i missing something?

    • @jalexisg
      @jalexisg 3 года назад

      Same issue trying to replicate the examples of first lecture. Don’t match using sha256.

    • @trent797
      @trent797 2 года назад +2

      On his mac, it is inserting a newline. If you put -n in the echo command to strip the newline, you will get the same result as online tools.

  • @damircicic
    @damircicic 2 года назад +1

    I wish the lady did the entire lecture, she is much more easy to follow.

  • @ds-mi4od
    @ds-mi4od 3 года назад

    Tadge 14:45

  • @jagelves
    @jagelves 2 года назад

    Poisson or Exponential?

    • @jagelves
      @jagelves Год назад

      @@josephvanname3377 Right. The slide said Poisson, however, it gives the average time to produce the next block. 10 min.

  • @lowelovibes8035
    @lowelovibes8035 2 года назад

    not clear

  • @RichardBoase
    @RichardBoase 2 года назад

    PoW deanonymises nodes on a public network by design

  • @RiccardoVincelli
    @RiccardoVincelli Год назад

    Neha Narula keeps reusing unlicensed imagery 😂

  • @isheep225
    @isheep225 2 года назад +3

    You know MIT is full of precursor when one of the students at the front of the classroom uses a face mask in 2019

  • @shrikantpangale5520
    @shrikantpangale5520 3 года назад +1

    1:54 how the hell did that guy in cap wore a mask in Spring 2018 ...when covid outbreak happened in Jan2020 in U.S.

    • @AB-mx9lx
      @AB-mx9lx 3 года назад +1

      error in the matrix....

  • @DeAngeloYouKnow
    @DeAngeloYouKnow 5 лет назад +5

    Someone reply to this comment in june 2021 and ask me how my life is going.

    • @kamashioh4236
      @kamashioh4236 5 лет назад +1

      how life

    • @thethreeheadedmonkey
      @thethreeheadedmonkey 5 лет назад +6

      @@kamashioh4236 I feel like you should probably learn how to tell time before watching a lecture series from MIT on cryptocurrencies.

    • @DeAngeloYouKnow
      @DeAngeloYouKnow 5 лет назад

      @@thethreeheadedmonkey ahahhah

    • @abdullahh283
      @abdullahh283 5 лет назад +4

      @@thethreeheadedmonkey maybe the hash he's using got it all wrong? lol

    • @poshchief6735
      @poshchief6735 4 года назад

      Since now nothing going good 😞

  • @vib_di
    @vib_di 3 года назад

    Its all worthless now.

  • @iblard
    @iblard 5 лет назад +3

    Awful slides.

    • @ianb7400
      @ianb7400 2 года назад +2

      I love the slides. They are easy to read, no distracting graphics, and the dark background doesn't burn my eyes watching it at night. You can tell he's a programmer with slides like these.