this post was submitted on 09 Mar 2024
1299 points (94.2% liked)

Lemmy Shitpost

26852 readers
5470 users here now

Welcome to Lemmy Shitpost. Here you can shitpost to your hearts content.

Anything and everything goes. Memes, Jokes, Vents and Banter. Though we still have to comply with lemmy.world instance rules. So behave!


Rules:

1. Be Respectful


Refrain from using harmful language pertaining to a protected characteristic: e.g. race, gender, sexuality, disability or religion.

Refrain from being argumentative when responding or commenting to posts/replies. Personal attacks are not welcome here.

...


2. No Illegal Content


Content that violates the law. Any post/comment found to be in breach of common law will be removed and given to the authorities if required.

That means:

-No promoting violence/threats against any individuals

-No CSA content or Revenge Porn

-No sharing private/personal information (Doxxing)

...


3. No Spam


Posting the same post, no matter the intent is against the rules.

-If you have posted content, please refrain from re-posting said content within this community.

-Do not spam posts with intent to harass, annoy, bully, advertise, scam or harm this community.

-No posting Scams/Advertisements/Phishing Links/IP Grabbers

-No Bots, Bots will be banned from the community.

...


4. No Porn/ExplicitContent


-Do not post explicit content. Lemmy.World is not the instance for NSFW content.

-Do not post Gore or Shock Content.

...


5. No Enciting Harassment,Brigading, Doxxing or Witch Hunts


-Do not Brigade other Communities

-No calls to action against other communities/users within Lemmy or outside of Lemmy.

-No Witch Hunts against users/communities.

-No content that harasses members within or outside of the community.

...


6. NSFW should be behind NSFW tags.


-Content that is NSFW should be behind NSFW tags.

-Content that might be distressing should be kept behind NSFW tags.

...

If you see content that is a breach of the rules, please flag and report the comment and a moderator will take action where they can.


Also check out:

Partnered Communities:

1.Memes

2.Lemmy Review

3.Mildly Infuriating

4.Lemmy Be Wholesome

5.No Stupid Questions

6.You Should Know

7.Comedy Heaven

8.Credible Defense

9.Ten Forward

10.LinuxMemes (Linux themed memes)


Reach out to

All communities included on the sidebar are to be made in compliance with the instance rules. Striker

founded 1 year ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 8 points 8 months ago (1 children)

and the "solutions" are all objectively worse security wise. And by thinking blockchains need proof of anything, you too misunderstand what a blockchain even is. Proof of whatever is needed by the concensus algorithm, not the blockchain.

[–] [email protected] -1 points 8 months ago (1 children)

no; they all have trade-offs and that’s different… you can have trust less proof amongst semi-trusted parties like a consortium of banks: they don’t entirely trust each other, but trust each other enough to keep an eye on the other members of the consortium

there are plenty of situations like this that are non-public

[–] [email protected] 2 points 8 months ago (1 children)

they are objectively, mathematically weaker.

Joining ethereum now implies trusting a complete stranger to get you up to speed. It is objectively subjective.

[–] [email protected] 0 points 8 months ago (1 children)

i wasn’t talking about ethereum, and i don’t think anyone was saying they don’t have TRADE OFFS. in the world of consensus protocols, there are many different trade offs that build a network that suits your needs

however the consensus protocol has little to do with how mathematically secure a network is: the security of the consensus protocol comes down to a lot of complex things

it also has nothing to do with how you bootstrap a node

these things are all different, albeit interconnected things

[–] [email protected] 2 points 8 months ago* (last edited 8 months ago)

the consensus algorithm is the only thing that contributes to the network's security. That, and because it's trying to solve an impossible problem, it also needs the psychological element exploiting humans' greed (and therefore want to hoard currency).