this post was submitted on 13 Nov 2024
971 points (98.1% liked)
People Twitter
5398 readers
1398 users here now
People tweeting stuff. We allow tweets from anyone.
RULES:
- Mark NSFW content.
- No doxxing people.
- Must be a pic of the tweet or similar. No direct links to the tweet.
- No bullying or international politcs
- Be excellent to each other.
- Provide an archived link to the tweet (or similar) being shown if it's a major figure or a politician.
founded 2 years ago
MODERATORS
Interesting. Good to know. Thanks!
Blockchain is effectively a distributed database. Almost always a good centralized database functions better.
Nah. the commenter above is just wrong. It's just that anyone who isn't selling bullshit uses their real name- Merkel trees - which are fundamental to modern software development (git, zfs, nix, nosql).
That's a similar but different concept. Blockchain adds a way to determine consensus of the correct tree. While git is distributed, it's generally not trustless, there's generally a trusted version of the repository.
what? Git is very much distributed and while you can have a main branch, you can set as many up streams as you want and merge things sideways.
It's trust less in the sense that commits can't be easily forged and are signed with cryptographic keys and identities-- as in, I don't have to trust that the source code is genuine since I can verify the commit history myself.
Consensus is just a pull request.
That wiki article literally lists Bitcoin and Ethereum as implementations of Merkel trees.
I'm pretty sure being able to verify that the person responsible for a push is an actual maintainer is the opposite of trustless.
How is it any different than verifying that a transaction occurred?
How is a trusted repository different from a hard fork?
Isn't "proving someone is a maintainer" just an IRL proof of stake?
With a centralized trust source (bank), you ask for the records.
Because you check who owns and maintains it. A notable example was with Simple Apps for Android, earlier this year the main repo was sold to a company. Trust was lost, thus a fork was created to keep the original stuff.
Right, but isn't the "main chain" of Ethereum based on a similar principle wherein it's the main chain because it's the one the devs use?
What about BTC vs BTC lightning.
I'm genuinely failing to see a distinction here, and, again, the wiki article says that blockchains are special cases of Merkle trees.
No clue, I don't keep an eye on that, I'm partially aware that there are several similar forks (and eth classic was a result of scammy shenanigans) but, afaict, none try to pretend they're the "real" ethereum.
A distinction between trust and trustless? Because my initial point was that git isn't trustless, because it works just like any other online system that requires a login, where a central server/database checks if the user sending inputs was properly identified by some mean (password, cryptographic key, something else). Implementing a Merkle or any other hash tree doesn't make something trustless
does git require authentication with a central server? I know that's common practice and true of github, but my recollection was that it was meant to fix the problem of distributed kernel development via an email listserv in the early 2000s. This stack exchange post discusses how it's not really centralized
Not being centralized has nothing to do with being trustless. The fediverse is also decentralized, yet you, me and everyone else has to log in to a specific server. If I try to login via lemmy.world, it'll fail. I have to login via programming.dev. Does that make lemmy and the fediverse trustless? No.
Even the top answer on that SO question explains that the use case of hash trees for git is different from that of blockchain
yeah, but this SO post has many up voted comments supporting my points as well.
183 votes for your "similar but not the same" and 103 votes for "they are the same". At the very least, I'd say this is far from settled fact
You're completely ignoring the point that being decentralized and/or implementing hash trees does not make a system trustless
no, no. I'm conceding that-- not ignoring that.
https://arxiv.org/abs/1803.00892