The "What is Money?" Show

Bitcoin, Proof of Work, and The Future of War with Adam Back & Jason Lowery (WIM175)

Jun 10, 2022
Ask episode
Chapters
Transcript
Episode notes
1
Introduction
00:00 • 3min
2
What Is Hash Cash?
02:33 • 2min
3
Is There a Birthday Collision?
04:49 • 6min
4
How to Use a Collision in Hash Functions
10:37 • 2min
5
Using Floyd's Cycle Finding to Find Birthday Collisions
13:00 • 5min
6
Using Zeros as the Challenge?
18:08 • 2min
7
How Much Ch Memory Should It Require?
20:00 • 5min
8
Trap Door Functions
24:55 • 2min
9
The a Simeter Is a Cimeter, and It's a Square Advantage.
27:05 • 4min
10
Is It a Cost Function or Proof of Work?
30:54 • 5min
11
How to Make a Bouncer Proto Call?
35:45 • 4min
12
Does the Web Service Providers Use Hash Functions?
39:42 • 5min
13
Hash Functions Are Convenient Building Blocks, and They're Efficient to Run
44:50 • 2min
14
Is There an Unboundedness of the Cost to Counter Fitting in Digital Space?
46:29 • 2min
15
Proof of Work
48:11 • 2min
16
The Problem Statement of a Bit Coin
50:27 • 4min
17
What's the Price of a Dollar Stable Coin?
54:30 • 2min
18
The Key to the Decentralization of but Coin?
56:27 • 2min
19
Defend Software From Systemic Abuse and Exploitation
58:23 • 4min
20
Defending Against the Syndical Abuse of All Software and Piper Space
01:02:05 • 2min
21
The Beauty of Bit Coin
01:04:29 • 5min
22
The Problem Is, You Know, You Don't Need an Identity
01:09:35 • 3min
23
Proof of Work Is the Only Way to Get Past Man Made Rules
01:12:07 • 2min
24
Is It a Viable Attack Factor on Bit Coin?
01:13:39 • 5min
25
Back Slash Hard Money
01:18:43 • 4min
26
The Problems Taxation, That Pike Money
01:22:17 • 2min
27
The Old at Age, Don't Hate the Play or Hate the Game, Right?
01:24:18 • 6min
28
Bitcoin
01:30:02 • 3min
29
The Concept of Ownership
01:32:58 • 3min
30
Objects in Siders Space
01:36:21 • 3min
31
Is the State Creating Property Rights?
01:39:16 • 2min
32
Is There a Way Out?
01:41:23 • 2min
33
General Purpose Computers - What Are They?
01:43:16 • 5min
34
Is There a Way to Prevent Software From Exploitation?
01:48:14 • 5min
35
Soft War - The Third Component of Warfare
01:53:08 • 3min
36
I Think It's a Big Move to Take to Erode the Kind of Dependency
01:55:56 • 5min
37
Coin So Potentially Solves the Money Problem
02:01:02 • 3min
38
War Fighting Is Not Going to Replace Like War
02:04:28 • 5min
39
El Salvador Is Starting to Do This Right?
02:09:10 • 4min
40
Is Bit Coin Exploitable?
02:13:24 • 5min
41
I Think the System Is Unobjectionable
02:18:43 • 3min
42
The Unbounded Physical Cost of Hashing
02:21:15 • 3min
43
Is It an Uneconomic Attack?
02:24:01 • 5min
44
Bitcoin Protocall - Is Bit Coin So Special?
02:29:07 • 3min
45
The the Exhaust of a Soft War Is Cheap Power, Right?
02:31:46 • 6min
46
How Do You Avoid Systemic Abuse and Exploitation?
02:37:37 • 1min
47
The Bit Coin Network Attack
02:38:59 • 3min
48
Bit Coin - The Paradox of the Transition From Hardware to Soft War
02:42:27 • 3min
49
The Power of Rules Is Inefficient, Right?
02:45:05 • 5min
50
Why Football Is Not a Zero Trust Game
02:50:03 • 2min
51
Is It Paradoxical That We Make Trust Really Inexpensive?
02:51:47 • 5min