At a fundamental level, blockchains are composed of multiple distinct layers, similar to other technology protocols like the internet paradigm (Link, Network, Internet, Transport, Application). Here, we present a framework of the layers that compose blockchains. The layers are defined such that each layer depends on the one(s) below it. Here, we discuss what each layer provides as opposed to how each layer is implemented.
Dark DAO operators can further muddy the waters by launching attacks on choices the vote buyers actually oppose as potential false flag operations or smear campaigns; for example, Bob could run a Dark DAO working in Alice’s favor to delegitimize the outcome of an election Bob believes he is likely to lose. The activation threshold, payout schedule, full attack strategy, number of users in the system, total amount of money pledged to the system, and more can be kept private or revealed either selectively or globally, making such DAOs ultimately tunable for structured incentive changes.Because the organization exists off-chain, no cartel of block producers or other system participants can detect, censor, or stop the attack.
A few months ago, it was publicly exposed that ASICs had been developed in secret to mine Monero. My sources say that they had been mining on these secret ASICs since early 2017, and got almost a full year of secret mining in before discovery. The ROI on those secret ASICs was massive, and gave the group more than enough money to try again with other ASIC resistant coins.It’s estimated that Monero’s secret ASICs made up more than 50% of the hashrate for almost a full year before discovery, and during that time, nobody noticed. During that time, a huge fraction of the Monero issuance was centralizing into the hands of a small group, and a 51% attack could have been executed at any time.