Re: BTC Game Theory
one weakness in the game theory approach is it does not have an observer. . it is the right strategy to always play rock, if you would like the observer to think you are an idiot
On Mon, Oct 19, 2015 at 4:40 PM, Jeremy Rubin < > wrote:
Jeffrey, Turns out one of Martin's students, Julian is in my class. We chatted afterwards, I figured you'd like some of these links so forwarding...
I particularly recommend Fake Version Changing, Gap Mining, and Selfish mining, the other stuff is more introductory on Bitcoin's model.
@JeremyRubin
------ Forwarded message ------
From: Jeremy Rubin <[REDACTED]>
Date: Mon, Oct 19, 2015 at 4:39 PM
Subject: BTC Game Theory
To: [REDACTED]
Hi Julian,
Was great talking with you after class. I definitely think you should think about doing some Bitcoin research at PED — here are some links to get you going (don't be overloaded by them, but there is good shit here! Maybe PED should do a reading group):
http://www.jbonneau.com/doc/BMCNKF15-IEEESP-bitcoin.pdf < General intro to btc
https://freedom-to-tinker.com/blog/felten/game-theory-and-bitcoin/ < Game theory intro on btc
https://freedom-to-tinker.com/blog/randomwalker/bitcoin-and-game-theory-were-still-scratching-the-surface/ < Game theory
intro
http://www.cs.huji.ac.il/-yoadlew/bitcoin.pdf<Mining Game theory
http://arxiv.org/abs/1311.0243 < selfish mining paper
http://hackingdistributed.com/2014/01/15/detecting-selfish-mining/ < detecting selfish miners
https://eprint.iacr.org/2015/796.pdf< Generalizing the model of selfish mining
https://dl.dropboxusercontent.com/u/131764/web/bitcoin_mind_the_gap.pdf< Gap mining
https://bitcointalk.org/index.php?topic=1154520.0 < Fake version changing
My philosophical POV is that bitcoin is a lot like the bourgeois strategy in hawk dove — it provides a common rule we can defect to reliably for resolving disputes. But there's so much more layered in how that rule gets made.
Cheers,
EFTA00843198
Jeremy
@JeremyRubin
please note
The information contained in this communication is confidential, may be attorney-client privileged, may constitute inside information, and is intended only for the use of the addressee. It is the property of JEE
Unauthorized use, disclosure or copying of this communication or any part thereof is strictly prohibited and may be unlawful. If you have received this communication in error, please notify us immediately by return e-mail or by e-mail to jeevacation@gmail.com, and destroy this communication and all copies thereof, including all attachments. copyright -all rights reserved
EFTA00843199
