EFTA00843198.pdf

DataSet-9 2 pages 371 words document
👁 1 💬 0
📄 Extracted Text (371 words)
From: "Jeffrey E." <[email protected]> To: Jeremy Rubin cal > Subject: Re: BTC Game Theory Date: Mon, 19 Oct 2015 20:45:12 +0000 one weakness in the game theory approach is it does not have an observer. . it is the right strategy to always play rock, if you would like the observer to think you are an idiot On Mon, Oct 19, 2015 at 4:40 PM, Jeremy Rubin c wrote: Jeffrey, Turns out one of Martin's students, Julian is in my class. We chatted afterwards, I figured you'd like some of these links so forwarding... I particularly recommend Fake Version Changing, Gap Mining, and Selfish mining, the other stuff is more introductory on Bitcoin's model. @JeremyRubin Forwarded messa e From: Jeremy Rubin Date: Mon, Oct 19, 2015 at 4:39 PM Subject: BTC Game Theory To Hi Julian, Was great talking with you after class. I definitely think you should think about doing some Bitcoin research at PED — here are some links to get you going (don't be overloaded by them, but there is good shit here! Maybe PED should do a reading group): http:/N.w.v.jbonneau.com/doc/BMCNKF15-IEEESP-bitcoin.pdf < General intro to btc https://freedom-to-tinker.comiblogifelten/game-theory-and-bitcoin/ < Game theory intro on btc https://freedom-to-tinker.comiblog/randomwalker/bitcoin-and-game-theory-were-still-scratching-the-surfacei < Game theory intro http:/Noww.cs.huji.ac.ilf-yoadlew/bitcoin.pdf < Mining Game theory http:llarxiv.orglabs/1311.0243 < selfish mining paper http://hackingdistributed.com/2014/01/15/detecting-selfish-mining/ < detecting selfish miners https://eprint.iacr.org/20151796.pdf < Generalizing the model of selfish mining https://dl.dropboxusercontent.com/u/131764Iweb/bitcoin mind the gap.pdf < Gap mining https://bitcointalk.org/index.php?topic=1154520.0 < Fake version changing My philosophical POV is that bitcoin is a lot like the bourgeois strategy in hawk dove — it provides a common rule we can defect to reliably for resolving disputes. But there's so much more layered in how that rule gets made. Cheers, EFTA00843198 Jeremy @JeremyRubin please note The information contained in this communication is confidential, may be attorney-client privileged, may constitute inside information, and is intended only for the use of the addressee. It is the property of JEE Unauthorized use, disclosure or copying of this communication or any part thereof is strictly prohibited and may be unlawful. If you have received this communication in error, please notify us immediately by return e-mail or by e-mail to [email protected], and destroy this communication and all copies thereof, including all attachments. copyright -all rights reserved EFTA00843199
ℹ️ Document Details
SHA-256
4549ba3aa729779a54a6bed05c6c974170476f26001398d7301ec062a4d91a24
Bates Number
EFTA00843198
Dataset
DataSet-9
Type
document
Pages
2

Community Rating

Sign in to rate this document

📋 What Is This?

Loading…
Sign in to add a description

💬 Comments 0

Sign in to join the discussion
Loading comments…
Link copied!