A M D D E F N V I D I A E L S E I A
Doing ProgPoW is an active choice to maintain the current landscape. Not doing ProgPoW is also an active choice. As long as people accept that doing nothing is not “maintaining the status quo” I’m good
At this point I think we agree that it's a decision either way that will have consequences we accept.
During the move of Zcash from GPU to ASICs we observed a large geographical centralization of miners in China, currently ~75-80% of the total Zcash network hashrate comes only from China (see https://explorer.zcha.in/statistics/miners). With ETH the split is currently at around 50%-50% between hashrate coming from China and the rest of the World.
I guess I'm not sure why centralization of mining power is inherently a bad thing. I understand why abuse is a bad thing, but as I said earlier, having ProgPOW in our pockets and ready to deploy would act as a deterrent against ASIC miner abuse, because they would immediately get bricked. If we can prevent the abuse, I feel like it is safer.
Looking at how effectively some ASIC manufacturers have spread conspiracy theories and mobilized the mob against ProgPoW
Wtf, am I a mob to you? Is Bob Summerwill?
You are choosing to displace a highly distributed mining base, built on the backs of crazy amount of investments during the goldrush of 2017/2018.
With all due respect @salanki I have no sympathy for GPU miner profits. You are all more or less Uber drivers to me—service providers. You serve our network because we pay you, and you are replaceable. And as we all know, replacing you was the plan all along. The only reason you haven't been replaced to date is because PoS is taking longer than expected.
To quote myself from ACD:
In other words, ASIC resistance at the dawn of Ethereum was a worthy goal, but the situation is much different when we already have an army of GPU miners, ProgPOW on deck, and PoS coming soon. I believe we're in a better, safer, position now to relax "full ASIC resistance" as a goal.
Kristy gets into one such attack here:
Censorship attacks are where miners choose not to include transactions with certain properties — such as specific to and from addresses, or fees below a certain threshold. The attack is performed by selfish mining: a method where an attacker creates blocks, and build a private chain without telling others. Once the attacker’s chain is longer than the others, they proclaim it to the world. The public miners building on what they perceived to be the longest chain will automatically adopt theirs.