
The "What is Money?" Show Bitcoin, Proof of Work, and The Future of War with Adam Back & Jason Lowery (WIM175)
Jun 10, 2022
Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51
Introduction
00:00 • 3min
What Is Hash Cash?
02:33 • 2min
Is There a Birthday Collision?
04:49 • 6min
How to Use a Collision in Hash Functions
10:37 • 2min
Using Floyd's Cycle Finding to Find Birthday Collisions
13:00 • 5min
Using Zeros as the Challenge?
18:08 • 2min
How Much Ch Memory Should It Require?
20:00 • 5min
Trap Door Functions
24:55 • 2min
The a Simeter Is a Cimeter, and It's a Square Advantage.
27:05 • 4min
Is It a Cost Function or Proof of Work?
30:54 • 5min
How to Make a Bouncer Proto Call?
35:45 • 4min
Does the Web Service Providers Use Hash Functions?
39:42 • 5min
Hash Functions Are Convenient Building Blocks, and They're Efficient to Run
44:50 • 2min
Is There an Unboundedness of the Cost to Counter Fitting in Digital Space?
46:29 • 2min
Proof of Work
48:11 • 2min
The Problem Statement of a Bit Coin
50:27 • 4min
What's the Price of a Dollar Stable Coin?
54:30 • 2min
The Key to the Decentralization of but Coin?
56:27 • 2min
Defend Software From Systemic Abuse and Exploitation
58:23 • 4min
Defending Against the Syndical Abuse of All Software and Piper Space
01:02:05 • 2min
The Beauty of Bit Coin
01:04:29 • 5min
The Problem Is, You Know, You Don't Need an Identity
01:09:35 • 3min
Proof of Work Is the Only Way to Get Past Man Made Rules
01:12:07 • 2min
Is It a Viable Attack Factor on Bit Coin?
01:13:39 • 5min
Back Slash Hard Money
01:18:43 • 4min
The Problems Taxation, That Pike Money
01:22:17 • 2min
The Old at Age, Don't Hate the Play or Hate the Game, Right?
01:24:18 • 6min
Bitcoin
01:30:02 • 3min
The Concept of Ownership
01:32:58 • 3min
Objects in Siders Space
01:36:21 • 3min
Is the State Creating Property Rights?
01:39:16 • 2min
Is There a Way Out?
01:41:23 • 2min
General Purpose Computers - What Are They?
01:43:16 • 5min
Is There a Way to Prevent Software From Exploitation?
01:48:14 • 5min
Soft War - The Third Component of Warfare
01:53:08 • 3min
I Think It's a Big Move to Take to Erode the Kind of Dependency
01:55:56 • 5min
Coin So Potentially Solves the Money Problem
02:01:02 • 3min
War Fighting Is Not Going to Replace Like War
02:04:28 • 5min
El Salvador Is Starting to Do This Right?
02:09:10 • 4min
Is Bit Coin Exploitable?
02:13:24 • 5min
I Think the System Is Unobjectionable
02:18:43 • 3min
The Unbounded Physical Cost of Hashing
02:21:15 • 3min
Is It an Uneconomic Attack?
02:24:01 • 5min
Bitcoin Protocall - Is Bit Coin So Special?
02:29:07 • 3min
The the Exhaust of a Soft War Is Cheap Power, Right?
02:31:46 • 6min
How Do You Avoid Systemic Abuse and Exploitation?
02:37:37 • 1min
The Bit Coin Network Attack
02:38:59 • 3min
Bit Coin - The Paradox of the Transition From Hardware to Soft War
02:42:27 • 3min
The Power of Rules Is Inefficient, Right?
02:45:05 • 5min
Why Football Is Not a Zero Trust Game
02:50:03 • 2min
Is It Paradoxical That We Make Trust Really Inexpensive?
02:51:47 • 5min
