
Cassie Heart
@cassie
1856 Following
277690 Followers
0 reply
0 recast
1 reaction
1 reply
0 recast
1 reaction
2 replies
1 recast
1 reaction
1 reply
0 recast
1 reaction
3 replies
1 recast
46 reactions
0 reply
0 recast
2 reactions
1 reply
0 recast
0 reaction
1 reply
1 recast
6 reactions
1 reply
0 recast
1 reaction
0 reply
0 recast
0 reaction
0 reply
0 recast
1 reaction
0 reply
0 recast
3 reactions
0 reply
0 recast
3 reactions
0 reply
0 recast
5 reactions
0 reply
0 recast
1 reaction

I don't believe it's due to lack of connections, it's the immutability factor. These networks are largely built as immutable structures, "code is law", including the consequences of people finding ways to "break the law", metaphorically or literally. This, combined with their limited "bandwidth" results in parallel systems built because frankly, why would Google adopt a permissionless smart contract driven approach to certificate transparency if an obscure selector bug let someone take over Google.com permanently? Being able to override these things are technically possible with the right code, but its layers of additional complication, for a language nobody outside of crypto uses, on a system that again, processes data at the speed of a 8088 on a good day. Fixing these problems is what wins over big tech. They do not care about principles of neutrality or decentralization, they care about their own objectives, and if they can't align, everyone from leadership to stakeholders will emphatically reject crypto. 1 reply
0 recast
2 reactions
it comes down to fork choice – if 70% of the network chooses a fork where reversal is a permitted state change, then 70% of the network is on a fork where reversal is a permitted state change, and 30% is not. Which one is the "official" network? That comes down to the conensus of users, ultimately. From the perspective of Quilibrium the company, if there is a _protocol-level_ vulnerability that resulted in loss, our position is to issue an alert, halt our own nodes, and issue a patch to resolve that. If there is an _application-level_ vulnerability, it is ultimately the decision of the application developers on how to handle, although for Q Inc-oriented operations like maintenance of the bridge code, helping stop the flow of compromised tokens is something we can help on.
In short, it's grey – as is any situation where human consensus is a part of the picture. When the DAO hack happened, the majority fork chose Ethereum as it is today, the minority fork became Eth Classic. 0 reply
0 recast
1 reaction
1 reply
0 recast
3 reactions
0 reply
0 recast
0 reaction
1 reply
0 recast
2 reactions