It is an enforcement, an assumption, the protocol be a basic:
Peer 1: Here are digits X for fulfillment Y
Peer 2: Thanks
----
I modeled it after the cash transaction at Walmart. It goes like this:
Customer: Here is wad of sweaty cash,
Clerk: OK, your thing is in the bag.
It is essential because of the necessity of an atomic transaction on the graph,. Any protocol more complex, the hackers will have a consistent entropy shortage to exploit. They can cooperate, and cut insider transactions on the graph in search of better bid/ask.
Bidding,between two bots are simply countable compounds of the above.
What happens when the rule says:
Each participant must send a letter to Janet.
The hackers time the response for Janet. The assume a locally smooth surface betwern time and couns on the graph. So, they know how many insider trades they can store within the graph, before writing a letter to Janet.
We don;t want this:
No comments:
Post a Comment