Hacker News new | past | comments | ask | show | jobs | submit login

>But even on a POW chain you still have to trust software from a third party to some degree in order bootstrap your node.

You really don't have to trust the software with POW. The POW is encoded in the blockchain itself and can be independently verified by performing a series of hash operations.

With only the blockchain data, and a description of the blockchain layout, one can independently confirm the total amount of "work" done.

This is true decentalization & a huge benefit of POW over POS.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: