At the end of the day, cryptocurrency miner manufacturers are selling money printing machines. A well-funded profit maximizing entity is only going to sell a money printing machine for more money than they expect they could get it to print themselves. The buyer needs to understand why the manufacturer is selling the units instead of keeping them for…
…HTTP protocol enforces TLS and nobody would ever “fix this flaw” to stay within the wording of TNW. I could also argue to have found a vulnerability in cars and prove it, by driving my own car into a wall.
The DCI post states that “most people wouldn’t be interested in buying a refrigerator operated by a hand crank, even if the advertisement said ‘No electricity required!’” We feel that a better analogy might be that of opening the refrigerator door yourself, versus paying a “miner” to open it for you. Indeed, you expend some small amount of calories to open the door, but most people would not consider that a “fee” in any traditional sense.
…n this vulnerability report was published, DAGLabs was in the middle of…n this vulnerability report was published, DAGLabs was in the middle of a Series-A financing round. At the very least, the vulnerability report was published at a very convenient time for DAGLabs.
Yet, Zcash also “rolled their own crypto”, a fact which was well-covered in DLT media. Oddly, this hasn’t raised any red flags or comprehensive investigations into Zcash’s own cryptography, or blog posts from DCI with statements such as, “Please don’t roll your own crypto” and, “Large organizations and well-known individuals should not lend their names and reputation to technology they have not vetted.”
…DCI team. In the blog post, the DCI team promised that a full report and code release would follow. Several months later, after repeated requests from the IOTA team, the DCI team has still not released any exploit code publicly.