ASIC boost is definitely a protocol vulnerability. It makes Bitcoin resistant to current and future modifications which are necessary to preserve decentralization. That alone should be enough to prioritize a swift preventative measure. On May 18, 2017 3:29 PM, "Ryan Grant via bitcoin-dev" < bitcoin-dev@lists.linuxfoundation.org> wrote: On Thu, May 18, 2017 at 9:44 AM, Cameron Garnham via bitcoin-dev wrote: > 3. We should assign a CVE to the vulnerability exploited by ‘ASICBOOST’. > > ‘ASICBOOST’ is an attack on this Bitcoin’s security assumptions and > should be considered an exploit of the Bitcoin Proof-of-Work > Function. On Thu, May 18, 2017 at 10:59 AM, Tier Nolan via bitcoin-dev wrote: > Arguably as long as the effort to find a block is proportional to the block > difficulty parameter, then it isn't an exploit. It is just an optimisation. One principled way to proceed would be to fault not the exploit, but the protocol design. Bits in the block header have been discovered which could be used for dual meanings, and at least one meaning does not preserve the incentive balances intended and assumed by others. This unexpectedly creates an incentive to block protocol improvements. The protocol must be repaired. In this view, which focuses on covert-ASICBOOST, how work is done is up to the implementation. But if the hashing work specified possibly could gain from blocking development work, then we have a vulnerability. I believe this is clear grounds for taking action without any delay. _______________________________________________ bitcoin-dev mailing list bitcoin-dev@lists.linuxfoundation.org https://lists.linuxfoundation.org/mailman/listinfo/bitcoin-dev