id sid tid token lemma pos blog-dshr-org-2064 1 1 DSHR DSHR NNP blog-dshr-org-2064 1 2 's 's POS blog-dshr-org-2064 1 3 Blog blog NN blog-dshr-org-2064 1 4 : : : blog-dshr-org-2064 1 5 Why why WRB blog-dshr-org-2064 1 6 Decentralize decentralize IN blog-dshr-org-2064 1 7 ? ? . blog-dshr-org-2064 2 1 DSHR DSHR NNP blog-dshr-org-2064 2 2 's 's POS blog-dshr-org-2064 2 3 Blog Blog NNP blog-dshr-org-2064 2 4 I -PRON- PRP blog-dshr-org-2064 2 5 'm be VBP blog-dshr-org-2064 2 6 David David NNP blog-dshr-org-2064 2 7 Rosenthal Rosenthal NNP blog-dshr-org-2064 2 8 , , , blog-dshr-org-2064 2 9 and and CC blog-dshr-org-2064 2 10 this this DT blog-dshr-org-2064 2 11 is be VBZ blog-dshr-org-2064 2 12 a a DT blog-dshr-org-2064 2 13 place place NN blog-dshr-org-2064 2 14 to to TO blog-dshr-org-2064 2 15 discuss discuss VB blog-dshr-org-2064 2 16 the the DT blog-dshr-org-2064 2 17 work work NN blog-dshr-org-2064 2 18 I -PRON- PRP blog-dshr-org-2064 2 19 'm be VBP blog-dshr-org-2064 2 20 doing do VBG blog-dshr-org-2064 2 21 in in IN blog-dshr-org-2064 2 22 Digital Digital NNP blog-dshr-org-2064 2 23 Preservation Preservation NNP blog-dshr-org-2064 2 24 . . . blog-dshr-org-2064 3 1 Thursday Thursday NNP blog-dshr-org-2064 3 2 , , , blog-dshr-org-2064 3 3 December December NNP blog-dshr-org-2064 3 4 28 28 CD blog-dshr-org-2064 3 5 , , , blog-dshr-org-2064 3 6 2017 2017 CD blog-dshr-org-2064 3 7 Why why WRB blog-dshr-org-2064 3 8 Decentralize decentralize IN blog-dshr-org-2064 3 9 ? ? . blog-dshr-org-2064 4 1 In in IN blog-dshr-org-2064 4 2 Blockchain Blockchain NNP blog-dshr-org-2064 4 3 : : : blog-dshr-org-2064 4 4 Hype Hype NNP blog-dshr-org-2064 4 5 or or CC blog-dshr-org-2064 4 6 Hope Hope NNP blog-dshr-org-2064 4 7 ? ? . blog-dshr-org-2064 5 1 ( ( -LRB- blog-dshr-org-2064 5 2 paywalled paywalle VBN blog-dshr-org-2064 5 3 until until IN blog-dshr-org-2064 5 4 June June NNP blog-dshr-org-2064 5 5 ' ' POS blog-dshr-org-2064 5 6 18 18 CD blog-dshr-org-2064 5 7 ) ) -RRB- blog-dshr-org-2064 5 8 Radia Radia NNP blog-dshr-org-2064 5 9 Perlman Perlman NNP blog-dshr-org-2064 5 10 asks ask VBZ blog-dshr-org-2064 5 11 what what WP blog-dshr-org-2064 5 12 exactly exactly RB blog-dshr-org-2064 5 13 you -PRON- PRP blog-dshr-org-2064 5 14 get get VBP blog-dshr-org-2064 5 15 in in IN blog-dshr-org-2064 5 16 return return NN blog-dshr-org-2064 5 17 for for IN blog-dshr-org-2064 5 18 the the DT blog-dshr-org-2064 5 19 decentralization decentralization NN blog-dshr-org-2064 5 20 provided provide VBN blog-dshr-org-2064 5 21 by by IN blog-dshr-org-2064 5 22 the the DT blog-dshr-org-2064 5 23 enormous enormous JJ blog-dshr-org-2064 5 24 resource resource NN blog-dshr-org-2064 5 25 cost cost NN blog-dshr-org-2064 5 26 of of IN blog-dshr-org-2064 5 27 blockchain blockchain JJ blog-dshr-org-2064 5 28 technologies technology NNS blog-dshr-org-2064 5 29 ? ? . blog-dshr-org-2064 6 1 Her -PRON- PRP$ blog-dshr-org-2064 6 2 answer answer NN blog-dshr-org-2064 6 3 is be VBZ blog-dshr-org-2064 6 4 : : : blog-dshr-org-2064 6 5 a a DT blog-dshr-org-2064 6 6 ledger ledger RB blog-dshr-org-2064 6 7 agreed agree VBN blog-dshr-org-2064 6 8 upon upon IN blog-dshr-org-2064 6 9 by by IN blog-dshr-org-2064 6 10 consensus consensus NN blog-dshr-org-2064 6 11 of of IN blog-dshr-org-2064 6 12 thousands thousand NNS blog-dshr-org-2064 6 13 of of IN blog-dshr-org-2064 6 14 anonymous anonymous JJ blog-dshr-org-2064 6 15 entities entity NNS blog-dshr-org-2064 6 16 , , , blog-dshr-org-2064 6 17 none none NN blog-dshr-org-2064 6 18 of of IN blog-dshr-org-2064 6 19 which which WDT blog-dshr-org-2064 6 20 can can MD blog-dshr-org-2064 6 21 be be VB blog-dshr-org-2064 6 22 held hold VBN blog-dshr-org-2064 6 23 responsible responsible JJ blog-dshr-org-2064 6 24 or or CC blog-dshr-org-2064 6 25 be be VB blog-dshr-org-2064 6 26 shut shut VBN blog-dshr-org-2064 6 27 down down RP blog-dshr-org-2064 6 28 by by IN blog-dshr-org-2064 6 29 some some DT blog-dshr-org-2064 6 30 malevolent malevolent JJ blog-dshr-org-2064 6 31 government government NN blog-dshr-org-2064 6 32 ... ... : blog-dshr-org-2064 6 33 [ [ -LRB- blog-dshr-org-2064 6 34 but but CC blog-dshr-org-2064 6 35 ] ] -RRB- blog-dshr-org-2064 6 36 most most JJS blog-dshr-org-2064 6 37 applications application NNS blog-dshr-org-2064 6 38 would would MD blog-dshr-org-2064 6 39 not not RB blog-dshr-org-2064 6 40 require require VB blog-dshr-org-2064 6 41 or or CC blog-dshr-org-2064 6 42 even even RB blog-dshr-org-2064 6 43 want want VB blog-dshr-org-2064 6 44 this this DT blog-dshr-org-2064 6 45 property property NN blog-dshr-org-2064 6 46 . . . blog-dshr-org-2064 7 1 Two two CD blog-dshr-org-2064 7 2 important important JJ blog-dshr-org-2064 7 3 essays essay NNS blog-dshr-org-2064 7 4 published publish VBN blog-dshr-org-2064 7 5 last last JJ blog-dshr-org-2064 7 6 February February NNP blog-dshr-org-2064 7 7 by by IN blog-dshr-org-2064 7 8 pioneers pioneer NNS blog-dshr-org-2064 7 9 in in IN blog-dshr-org-2064 7 10 the the DT blog-dshr-org-2064 7 11 field field NN blog-dshr-org-2064 7 12 provide provide VBP blog-dshr-org-2064 7 13 different different JJ blog-dshr-org-2064 7 14 answers answer NNS blog-dshr-org-2064 7 15 to to IN blog-dshr-org-2064 7 16 Perlman Perlman NNP blog-dshr-org-2064 7 17 's 's POS blog-dshr-org-2064 7 18 question question NN blog-dshr-org-2064 7 19 : : : blog-dshr-org-2064 7 20 Vitalik Vitalik NNP blog-dshr-org-2064 7 21 Buterin Buterin NNP blog-dshr-org-2064 7 22 's 's POS blog-dshr-org-2064 7 23 answer answer NN blog-dshr-org-2064 7 24 in in IN blog-dshr-org-2064 7 25 The the DT blog-dshr-org-2064 7 26 Meaning Meaning NNP blog-dshr-org-2064 7 27 of of IN blog-dshr-org-2064 7 28 Decentralization Decentralization NNP blog-dshr-org-2064 7 29 is be VBZ blog-dshr-org-2064 7 30 that that IN blog-dshr-org-2064 7 31 what what WP blog-dshr-org-2064 7 32 you -PRON- PRP blog-dshr-org-2064 7 33 get get VBP blog-dshr-org-2064 7 34 depends depend VBZ blog-dshr-org-2064 7 35 on on IN blog-dshr-org-2064 7 36 what what WP blog-dshr-org-2064 7 37 exactly exactly RB blog-dshr-org-2064 7 38 you -PRON- PRP blog-dshr-org-2064 7 39 mean mean VBP blog-dshr-org-2064 7 40 by by IN blog-dshr-org-2064 7 41 " " `` blog-dshr-org-2064 7 42 decentralization decentralization NN blog-dshr-org-2064 7 43 " " '' blog-dshr-org-2064 7 44 . . . blog-dshr-org-2064 8 1 Nick Nick NNP blog-dshr-org-2064 8 2 Szabo Szabo NNP blog-dshr-org-2064 8 3 's 's POS blog-dshr-org-2064 8 4 answer answer NN blog-dshr-org-2064 8 5 in in IN blog-dshr-org-2064 8 6 Money money NN blog-dshr-org-2064 8 7 , , , blog-dshr-org-2064 8 8 blockchains blockchain NNS blog-dshr-org-2064 8 9 , , , blog-dshr-org-2064 8 10 and and CC blog-dshr-org-2064 8 11 social social JJ blog-dshr-org-2064 8 12 scalability scalability NN blog-dshr-org-2064 8 13 is be VBZ blog-dshr-org-2064 8 14 " " `` blog-dshr-org-2064 8 15 social social JJ blog-dshr-org-2064 8 16 scalability scalability NN blog-dshr-org-2064 8 17 " " '' blog-dshr-org-2064 8 18 Below below IN blog-dshr-org-2064 8 19 the the DT blog-dshr-org-2064 8 20 fold fold NN blog-dshr-org-2064 8 21 I -PRON- PRP blog-dshr-org-2064 8 22 try try VBP blog-dshr-org-2064 8 23 to to TO blog-dshr-org-2064 8 24 apply apply VB blog-dshr-org-2064 8 25 our -PRON- PRP$ blog-dshr-org-2064 8 26 experience experience NN blog-dshr-org-2064 8 27 with with IN blog-dshr-org-2064 8 28 the the DT blog-dshr-org-2064 8 29 decentralized decentralize VBN blog-dshr-org-2064 8 30 LOCKSS LOCKSS NNP blog-dshr-org-2064 8 31 technology technology NN blog-dshr-org-2064 8 32 to to TO blog-dshr-org-2064 8 33 ask ask VB blog-dshr-org-2064 8 34 whether whether IN blog-dshr-org-2064 8 35 their -PRON- PRP$ blog-dshr-org-2064 8 36 arguments argument NNS blog-dshr-org-2064 8 37 hold hold VBP blog-dshr-org-2064 8 38 up up RP blog-dshr-org-2064 8 39 . . . blog-dshr-org-2064 9 1 I -PRON- PRP blog-dshr-org-2064 9 2 'm be VBP blog-dshr-org-2064 9 3 working work VBG blog-dshr-org-2064 9 4 on on IN blog-dshr-org-2064 9 5 a a DT blog-dshr-org-2064 9 6 follow follow NN blog-dshr-org-2064 9 7 - - HYPH blog-dshr-org-2064 9 8 up up NN blog-dshr-org-2064 9 9 post post NN blog-dshr-org-2064 9 10 based base VBN blog-dshr-org-2064 9 11 on on IN blog-dshr-org-2064 9 12 Chelsea Chelsea NNP blog-dshr-org-2064 9 13 Barabas Barabas NNP blog-dshr-org-2064 9 14 , , , blog-dshr-org-2064 9 15 Neha Neha NNP blog-dshr-org-2064 9 16 Narula Narula NNP blog-dshr-org-2064 9 17 and and CC blog-dshr-org-2064 9 18 Ethan Ethan NNP blog-dshr-org-2064 9 19 Zuckerman Zuckerman NNP blog-dshr-org-2064 9 20 's 's POS blog-dshr-org-2064 9 21 Defending Defending NNP blog-dshr-org-2064 9 22 Internet Internet NNP blog-dshr-org-2064 9 23 Freedom Freedom NNP blog-dshr-org-2064 9 24 through through IN blog-dshr-org-2064 9 25 Decentralization decentralization NN blog-dshr-org-2064 9 26 from from IN blog-dshr-org-2064 9 27 last last JJ blog-dshr-org-2064 9 28 August August NNP blog-dshr-org-2064 9 29 , , , blog-dshr-org-2064 9 30 which which WDT blog-dshr-org-2064 9 31 asks ask VBZ blog-dshr-org-2064 9 32 the the DT blog-dshr-org-2064 9 33 question question NN blog-dshr-org-2064 9 34 specifically specifically RB blog-dshr-org-2064 9 35 about about IN blog-dshr-org-2064 9 36 the the DT blog-dshr-org-2064 9 37 decentralized decentralize VBN blog-dshr-org-2064 9 38 Web web NN blog-dshr-org-2064 9 39 and and CC blog-dshr-org-2064 9 40 thus thus RB blog-dshr-org-2064 9 41 the the DT blog-dshr-org-2064 9 42 idea idea NN blog-dshr-org-2064 9 43 of of IN blog-dshr-org-2064 9 44 decentralized decentralized JJ blog-dshr-org-2064 9 45 storage storage NN blog-dshr-org-2064 9 46 . . . blog-dshr-org-2064 10 1 Buterin Buterin NNP blog-dshr-org-2064 10 2 The the DT blog-dshr-org-2064 10 3 Meaning Meaning NNP blog-dshr-org-2064 10 4 of of IN blog-dshr-org-2064 10 5 Decentralization Decentralization NNP blog-dshr-org-2064 10 6 is be VBZ blog-dshr-org-2064 10 7 the the DT blog-dshr-org-2064 10 8 shorter short JJR blog-dshr-org-2064 10 9 and and CC blog-dshr-org-2064 10 10 more more RBR blog-dshr-org-2064 10 11 accessible accessible JJ blog-dshr-org-2064 10 12 of of IN blog-dshr-org-2064 10 13 the the DT blog-dshr-org-2064 10 14 two two CD blog-dshr-org-2064 10 15 essays essay NNS blog-dshr-org-2064 10 16 . . . blog-dshr-org-2064 11 1 Vitalik Vitalik NNP blog-dshr-org-2064 11 2 Buterin Buterin NNP blog-dshr-org-2064 11 3 is be VBZ blog-dshr-org-2064 11 4 a a DT blog-dshr-org-2064 11 5 co co NN blog-dshr-org-2064 11 6 - - NN blog-dshr-org-2064 11 7 founder founder NN blog-dshr-org-2064 11 8 of of IN blog-dshr-org-2064 11 9 Ethereum Ethereum NNP blog-dshr-org-2064 11 10 , , , blog-dshr-org-2064 11 11 as as IN blog-dshr-org-2064 11 12 one one PRP blog-dshr-org-2064 11 13 can can MD blog-dshr-org-2064 11 14 tell tell VB blog-dshr-org-2064 11 15 from from IN blog-dshr-org-2064 11 16 the the DT blog-dshr-org-2064 11 17 links link NNS blog-dshr-org-2064 11 18 in in IN blog-dshr-org-2064 11 19 his -PRON- PRP$ blog-dshr-org-2064 11 20 essay essay NN blog-dshr-org-2064 11 21 , , , blog-dshr-org-2064 11 22 which which WDT blog-dshr-org-2064 11 23 starts start VBZ blog-dshr-org-2064 11 24 by by IN blog-dshr-org-2064 11 25 discussing discuss VBG blog-dshr-org-2064 11 26 what what WDT blog-dshr-org-2064 11 27 decentralization decentralization NN blog-dshr-org-2064 11 28 means mean VBZ blog-dshr-org-2064 11 29 : : : blog-dshr-org-2064 11 30 When when WRB blog-dshr-org-2064 11 31 people people NNS blog-dshr-org-2064 11 32 talk talk VBP blog-dshr-org-2064 11 33 about about IN blog-dshr-org-2064 11 34 software software NN blog-dshr-org-2064 11 35 decentralization decentralization NN blog-dshr-org-2064 11 36 , , , blog-dshr-org-2064 11 37 there there EX blog-dshr-org-2064 11 38 are be VBP blog-dshr-org-2064 11 39 actually actually RB blog-dshr-org-2064 11 40 three three CD blog-dshr-org-2064 11 41 separate separate JJ blog-dshr-org-2064 11 42 axes axis NNS blog-dshr-org-2064 11 43 of of IN blog-dshr-org-2064 11 44 centralization centralization NN blog-dshr-org-2064 11 45 / / SYM blog-dshr-org-2064 11 46 decentralization decentralization NN blog-dshr-org-2064 11 47 that that WDT blog-dshr-org-2064 11 48 they -PRON- PRP blog-dshr-org-2064 11 49 may may MD blog-dshr-org-2064 11 50 be be VB blog-dshr-org-2064 11 51 talking talk VBG blog-dshr-org-2064 11 52 about about IN blog-dshr-org-2064 11 53 . . . blog-dshr-org-2064 12 1 While while IN blog-dshr-org-2064 12 2 in in IN blog-dshr-org-2064 12 3 some some DT blog-dshr-org-2064 12 4 cases case NNS blog-dshr-org-2064 12 5 it -PRON- PRP blog-dshr-org-2064 12 6 is be VBZ blog-dshr-org-2064 12 7 difficult difficult JJ blog-dshr-org-2064 12 8 to to TO blog-dshr-org-2064 12 9 see see VB blog-dshr-org-2064 12 10 how how WRB blog-dshr-org-2064 12 11 you -PRON- PRP blog-dshr-org-2064 12 12 can can MD blog-dshr-org-2064 12 13 have have VB blog-dshr-org-2064 12 14 one one CD blog-dshr-org-2064 12 15 without without IN blog-dshr-org-2064 12 16 the the DT blog-dshr-org-2064 12 17 other other JJ blog-dshr-org-2064 12 18 , , , blog-dshr-org-2064 12 19 in in IN blog-dshr-org-2064 12 20 general general JJ blog-dshr-org-2064 12 21 they -PRON- PRP blog-dshr-org-2064 12 22 are be VBP blog-dshr-org-2064 12 23 quite quite RB blog-dshr-org-2064 12 24 independent independent JJ blog-dshr-org-2064 12 25 of of IN blog-dshr-org-2064 12 26 each each DT blog-dshr-org-2064 12 27 other other JJ blog-dshr-org-2064 12 28 . . . blog-dshr-org-2064 13 1 The the DT blog-dshr-org-2064 13 2 axes axis NNS blog-dshr-org-2064 13 3 are be VBP blog-dshr-org-2064 13 4 as as IN blog-dshr-org-2064 13 5 follows follow VBZ blog-dshr-org-2064 13 6 : : : blog-dshr-org-2064 13 7 Architectural Architectural NNP blog-dshr-org-2064 13 8 ( ( -LRB- blog-dshr-org-2064 13 9 de)centralization de)centralization NN blog-dshr-org-2064 13 10     _SP blog-dshr-org-2064 13 11 — — : blog-dshr-org-2064 13 12     _SP blog-dshr-org-2064 13 13 how how WRB blog-dshr-org-2064 13 14 many many JJ blog-dshr-org-2064 13 15 physical physical JJ blog-dshr-org-2064 13 16 computers computer NNS blog-dshr-org-2064 13 17 is be VBZ blog-dshr-org-2064 13 18 a a DT blog-dshr-org-2064 13 19 system system NN blog-dshr-org-2064 13 20 made make VBN blog-dshr-org-2064 13 21 up up RP blog-dshr-org-2064 13 22 of of IN blog-dshr-org-2064 13 23 ? ? . blog-dshr-org-2064 14 1 How how WRB blog-dshr-org-2064 14 2 many many JJ blog-dshr-org-2064 14 3 of of IN blog-dshr-org-2064 14 4 those those DT blog-dshr-org-2064 14 5 computers computer NNS blog-dshr-org-2064 14 6 can can MD blog-dshr-org-2064 14 7 it -PRON- PRP blog-dshr-org-2064 14 8 tolerate tolerate VB blog-dshr-org-2064 14 9 breaking break VBG blog-dshr-org-2064 14 10 down down RP blog-dshr-org-2064 14 11 at at IN blog-dshr-org-2064 14 12 any any DT blog-dshr-org-2064 14 13 single single JJ blog-dshr-org-2064 14 14 time time NN blog-dshr-org-2064 14 15 ? ? . blog-dshr-org-2064 15 1 Political political JJ blog-dshr-org-2064 15 2 ( ( -LRB- blog-dshr-org-2064 15 3 de)centralization de)centralization NN blog-dshr-org-2064 15 4     _SP blog-dshr-org-2064 15 5 — — : blog-dshr-org-2064 15 6     _SP blog-dshr-org-2064 15 7 how how WRB blog-dshr-org-2064 15 8 many many JJ blog-dshr-org-2064 15 9 individuals individual NNS blog-dshr-org-2064 15 10 or or CC blog-dshr-org-2064 15 11 organizations organization NNS blog-dshr-org-2064 15 12 ultimately ultimately RB blog-dshr-org-2064 15 13 control control VBP blog-dshr-org-2064 15 14 the the DT blog-dshr-org-2064 15 15 computers computer NNS blog-dshr-org-2064 15 16 that that WDT blog-dshr-org-2064 15 17 the the DT blog-dshr-org-2064 15 18 system system NN blog-dshr-org-2064 15 19 is be VBZ blog-dshr-org-2064 15 20 made make VBN blog-dshr-org-2064 15 21 up up RP blog-dshr-org-2064 15 22 of of IN blog-dshr-org-2064 15 23 ? ? . blog-dshr-org-2064 16 1 Logical logical JJ blog-dshr-org-2064 16 2 ( ( -LRB- blog-dshr-org-2064 16 3 de)centralization de)centralization NN blog-dshr-org-2064 16 4 — — : blog-dshr-org-2064 16 5 does do VBZ blog-dshr-org-2064 16 6 the the DT blog-dshr-org-2064 16 7 interface interface NN blog-dshr-org-2064 16 8 and and CC blog-dshr-org-2064 16 9 data data NN blog-dshr-org-2064 16 10 structures structure NNS blog-dshr-org-2064 16 11 that that IN blog-dshr-org-2064 16 12 the the DT blog-dshr-org-2064 16 13 system system NN blog-dshr-org-2064 16 14 presents present VBZ blog-dshr-org-2064 16 15 and and CC blog-dshr-org-2064 16 16 maintains maintain NNS blog-dshr-org-2064 16 17 look look VBP blog-dshr-org-2064 16 18 more more JJR blog-dshr-org-2064 16 19 like like IN blog-dshr-org-2064 16 20 a a DT blog-dshr-org-2064 16 21 single single JJ blog-dshr-org-2064 16 22 monolithic monolithic JJ blog-dshr-org-2064 16 23 object object NN blog-dshr-org-2064 16 24 , , , blog-dshr-org-2064 16 25 or or CC blog-dshr-org-2064 16 26 an an DT blog-dshr-org-2064 16 27 amorphous amorphous JJ blog-dshr-org-2064 16 28 swarm swarm NN blog-dshr-org-2064 16 29 ? ? . blog-dshr-org-2064 17 1 One one CD blog-dshr-org-2064 17 2 simple simple JJ blog-dshr-org-2064 17 3 heuristic heuristic JJ blog-dshr-org-2064 17 4 is be VBZ blog-dshr-org-2064 17 5 : : : blog-dshr-org-2064 17 6 if if IN blog-dshr-org-2064 17 7 you -PRON- PRP blog-dshr-org-2064 17 8 cut cut VBP blog-dshr-org-2064 17 9 the the DT blog-dshr-org-2064 17 10 system system NN blog-dshr-org-2064 17 11 in in IN blog-dshr-org-2064 17 12 half half NN blog-dshr-org-2064 17 13 , , , blog-dshr-org-2064 17 14 including include VBG blog-dshr-org-2064 17 15 both both DT blog-dshr-org-2064 17 16 providers provider NNS blog-dshr-org-2064 17 17 and and CC blog-dshr-org-2064 17 18 users user NNS blog-dshr-org-2064 17 19 , , , blog-dshr-org-2064 17 20 will will MD blog-dshr-org-2064 17 21 both both DT blog-dshr-org-2064 17 22 halves half NNS blog-dshr-org-2064 17 23 continue continue VB blog-dshr-org-2064 17 24 to to TO blog-dshr-org-2064 17 25 fully fully RB blog-dshr-org-2064 17 26 operate operate VB blog-dshr-org-2064 17 27 as as IN blog-dshr-org-2064 17 28 independent independent JJ blog-dshr-org-2064 17 29 units unit NNS blog-dshr-org-2064 17 30 ? ? . blog-dshr-org-2064 18 1 He -PRON- PRP blog-dshr-org-2064 18 2 notes note VBZ blog-dshr-org-2064 18 3 that that IN blog-dshr-org-2064 18 4 : : : blog-dshr-org-2064 18 5 Blockchains blockchain NNS blog-dshr-org-2064 18 6 are be VBP blog-dshr-org-2064 18 7 politically politically RB blog-dshr-org-2064 18 8 decentralized decentralized JJ blog-dshr-org-2064 18 9 ( ( -LRB- blog-dshr-org-2064 18 10 no no DT blog-dshr-org-2064 18 11 one one NN blog-dshr-org-2064 18 12 controls control VBZ blog-dshr-org-2064 18 13 them -PRON- PRP blog-dshr-org-2064 18 14 ) ) -RRB- blog-dshr-org-2064 18 15 and and CC blog-dshr-org-2064 18 16 architecturally architecturally RB blog-dshr-org-2064 18 17 decentralized decentralize VBN blog-dshr-org-2064 18 18 ( ( -LRB- blog-dshr-org-2064 18 19 no no DT blog-dshr-org-2064 18 20 infrastructural infrastructural JJ blog-dshr-org-2064 18 21 central central JJ blog-dshr-org-2064 18 22 point point NN blog-dshr-org-2064 18 23 of of IN blog-dshr-org-2064 18 24 failure failure NN blog-dshr-org-2064 18 25 ) ) -RRB- blog-dshr-org-2064 18 26 but but CC blog-dshr-org-2064 18 27 they -PRON- PRP blog-dshr-org-2064 18 28 are be VBP blog-dshr-org-2064 18 29 logically logically RB blog-dshr-org-2064 18 30 centralized centralized JJ blog-dshr-org-2064 18 31 ( ( -LRB- blog-dshr-org-2064 18 32 there there EX blog-dshr-org-2064 18 33 is be VBZ blog-dshr-org-2064 18 34 one one CD blog-dshr-org-2064 18 35 commonly commonly RB blog-dshr-org-2064 18 36 agreed agree VBN blog-dshr-org-2064 18 37 state state NN blog-dshr-org-2064 18 38 and and CC blog-dshr-org-2064 18 39 the the DT blog-dshr-org-2064 18 40 system system NN blog-dshr-org-2064 18 41 behaves behave NNS blog-dshr-org-2064 18 42 like like IN blog-dshr-org-2064 18 43 a a DT blog-dshr-org-2064 18 44 single single JJ blog-dshr-org-2064 18 45 computer computer NN blog-dshr-org-2064 18 46 ) ) -RRB- blog-dshr-org-2064 18 47 The The NNP blog-dshr-org-2064 18 48 Global Global NNP blog-dshr-org-2064 18 49 LOCKSS LOCKSS NNP blog-dshr-org-2064 18 50 network network NN blog-dshr-org-2064 18 51 ( ( -LRB- blog-dshr-org-2064 18 52 GLN GLN NNP blog-dshr-org-2064 18 53 ) ) -RRB- blog-dshr-org-2064 18 54 is be VBZ blog-dshr-org-2064 18 55 decentralized decentralize VBN blog-dshr-org-2064 18 56 on on IN blog-dshr-org-2064 18 57 all all DT blog-dshr-org-2064 18 58 three three CD blog-dshr-org-2064 18 59 axes axis NNS blog-dshr-org-2064 18 60 . . . blog-dshr-org-2064 19 1 Individual individual JJ blog-dshr-org-2064 19 2 libraries library NNS blog-dshr-org-2064 19 3 control control VBP blog-dshr-org-2064 19 4 their -PRON- PRP$ blog-dshr-org-2064 19 5 own own JJ blog-dshr-org-2064 19 6 network network NN blog-dshr-org-2064 19 7 node node NN blog-dshr-org-2064 19 8 ; ; : blog-dshr-org-2064 19 9 nodes node NNS blog-dshr-org-2064 19 10 cooperate cooperate VBP blog-dshr-org-2064 19 11 but but CC blog-dshr-org-2064 19 12 do do VBP blog-dshr-org-2064 19 13 not not RB blog-dshr-org-2064 19 14 trust trust VB blog-dshr-org-2064 19 15 each each DT blog-dshr-org-2064 19 16 other other JJ blog-dshr-org-2064 19 17 ; ; : blog-dshr-org-2064 19 18 no no DT blog-dshr-org-2064 19 19 network network NN blog-dshr-org-2064 19 20 operation operation NN blog-dshr-org-2064 19 21 involves involve VBZ blog-dshr-org-2064 19 22 more more JJR blog-dshr-org-2064 19 23 than than IN blog-dshr-org-2064 19 24 a a DT blog-dshr-org-2064 19 25 small small JJ blog-dshr-org-2064 19 26 proportion proportion NN blog-dshr-org-2064 19 27 of of IN blog-dshr-org-2064 19 28 the the DT blog-dshr-org-2064 19 29 nodes node NNS blog-dshr-org-2064 19 30 . . . blog-dshr-org-2064 20 1 The the DT blog-dshr-org-2064 20 2 CLOCKSS CLOCKSS NNP blog-dshr-org-2064 20 3 network network NN blog-dshr-org-2064 20 4 , , , blog-dshr-org-2064 20 5 built build VBN blog-dshr-org-2064 20 6 from from IN blog-dshr-org-2064 20 7 the the DT blog-dshr-org-2064 20 8 same same JJ blog-dshr-org-2064 20 9 technology technology NN blog-dshr-org-2064 20 10 , , , blog-dshr-org-2064 20 11 is be VBZ blog-dshr-org-2064 20 12 decentralized decentralize VBN blog-dshr-org-2064 20 13 on on IN blog-dshr-org-2064 20 14 the the DT blog-dshr-org-2064 20 15 architectural architectural JJ blog-dshr-org-2064 20 16 and and CC blog-dshr-org-2064 20 17 logical logical JJ blog-dshr-org-2064 20 18 axes axis NNS blog-dshr-org-2064 20 19 , , , blog-dshr-org-2064 20 20 but but CC blog-dshr-org-2064 20 21 is be VBZ blog-dshr-org-2064 20 22 centralized centralize VBN blog-dshr-org-2064 20 23 on on IN blog-dshr-org-2064 20 24 the the DT blog-dshr-org-2064 20 25 political political JJ blog-dshr-org-2064 20 26 axis axis NN blog-dshr-org-2064 20 27 since since IN blog-dshr-org-2064 20 28 all all PDT blog-dshr-org-2064 20 29 the the DT blog-dshr-org-2064 20 30 nodes node NNS blog-dshr-org-2064 20 31 are be VBP blog-dshr-org-2064 20 32 owned own VBN blog-dshr-org-2064 20 33 by by IN blog-dshr-org-2064 20 34 the the DT blog-dshr-org-2064 20 35 CLOCKSS CLOCKSS NNP blog-dshr-org-2064 20 36 archive archive NN blog-dshr-org-2064 20 37 . . . blog-dshr-org-2064 21 1 Buterin Buterin NNP blog-dshr-org-2064 21 2 then then RB blog-dshr-org-2064 21 3 asks ask VBZ blog-dshr-org-2064 21 4 : : : blog-dshr-org-2064 21 5 why why WRB blog-dshr-org-2064 21 6 is be VBZ blog-dshr-org-2064 21 7 decentralization decentralization NN blog-dshr-org-2064 21 8 useful useful JJ blog-dshr-org-2064 21 9 in in IN blog-dshr-org-2064 21 10 the the DT blog-dshr-org-2064 21 11 first first JJ blog-dshr-org-2064 21 12 place place NN blog-dshr-org-2064 21 13 ? ? . blog-dshr-org-2064 22 1 There there EX blog-dshr-org-2064 22 2 are be VBP blog-dshr-org-2064 22 3 generally generally RB blog-dshr-org-2064 22 4 several several JJ blog-dshr-org-2064 22 5 arguments argument NNS blog-dshr-org-2064 22 6 raised raise VBD blog-dshr-org-2064 22 7 : : : blog-dshr-org-2064 22 8 Fault fault NN blog-dshr-org-2064 22 9 tolerance tolerance NN blog-dshr-org-2064 22 10 — — : blog-dshr-org-2064 22 11 decentralized decentralize VBN blog-dshr-org-2064 22 12 systems system NNS blog-dshr-org-2064 22 13 are be VBP blog-dshr-org-2064 22 14 less less RBR blog-dshr-org-2064 22 15 likely likely JJ blog-dshr-org-2064 22 16 to to TO blog-dshr-org-2064 22 17 fail fail VB blog-dshr-org-2064 22 18 accidentally accidentally RB blog-dshr-org-2064 22 19 because because IN blog-dshr-org-2064 22 20 they -PRON- PRP blog-dshr-org-2064 22 21 rely rely VBP blog-dshr-org-2064 22 22 on on IN blog-dshr-org-2064 22 23 many many JJ blog-dshr-org-2064 22 24 separate separate JJ blog-dshr-org-2064 22 25 components component NNS blog-dshr-org-2064 22 26 that that WDT blog-dshr-org-2064 22 27 are be VBP blog-dshr-org-2064 22 28 not not RB blog-dshr-org-2064 22 29 likely likely JJ blog-dshr-org-2064 22 30 . . . blog-dshr-org-2064 23 1 Attack attack NN blog-dshr-org-2064 23 2 resistance resistance NN blog-dshr-org-2064 23 3 — — : blog-dshr-org-2064 23 4 decentralized decentralize VBN blog-dshr-org-2064 23 5 systems system NNS blog-dshr-org-2064 23 6 are be VBP blog-dshr-org-2064 23 7 more more RBR blog-dshr-org-2064 23 8 expensive expensive JJ blog-dshr-org-2064 23 9 to to TO blog-dshr-org-2064 23 10 attack attack VB blog-dshr-org-2064 23 11 and and CC blog-dshr-org-2064 23 12 destroy destroy VB blog-dshr-org-2064 23 13 or or CC blog-dshr-org-2064 23 14 manipulate manipulate VB blog-dshr-org-2064 23 15 because because IN blog-dshr-org-2064 23 16 they -PRON- PRP blog-dshr-org-2064 23 17 lack lack VBP blog-dshr-org-2064 23 18 sensitive sensitive JJ blog-dshr-org-2064 23 19 central central JJ blog-dshr-org-2064 23 20 points point NNS blog-dshr-org-2064 23 21 that that WDT blog-dshr-org-2064 23 22 can can MD blog-dshr-org-2064 23 23 be be VB blog-dshr-org-2064 23 24 attacked attack VBN blog-dshr-org-2064 23 25 at at IN blog-dshr-org-2064 23 26 much much RB blog-dshr-org-2064 23 27 lower low JJR blog-dshr-org-2064 23 28 cost cost NN blog-dshr-org-2064 23 29 than than IN blog-dshr-org-2064 23 30 the the DT blog-dshr-org-2064 23 31 economic economic JJ blog-dshr-org-2064 23 32 size size NN blog-dshr-org-2064 23 33 of of IN blog-dshr-org-2064 23 34 the the DT blog-dshr-org-2064 23 35 surrounding surround VBG blog-dshr-org-2064 23 36 system system NN blog-dshr-org-2064 23 37 . . . blog-dshr-org-2064 24 1 Collusion collusion NN blog-dshr-org-2064 24 2 resistance resistance NN blog-dshr-org-2064 24 3     _SP blog-dshr-org-2064 24 4 — — : blog-dshr-org-2064 24 5     _SP blog-dshr-org-2064 24 6 it -PRON- PRP blog-dshr-org-2064 24 7 is be VBZ blog-dshr-org-2064 24 8 much much RB blog-dshr-org-2064 24 9 harder hard JJR blog-dshr-org-2064 24 10 for for IN blog-dshr-org-2064 24 11 participants participant NNS blog-dshr-org-2064 24 12 in in IN blog-dshr-org-2064 24 13 decentralized decentralize VBN blog-dshr-org-2064 24 14 systems system NNS blog-dshr-org-2064 24 15 to to TO blog-dshr-org-2064 24 16 collude collude VB blog-dshr-org-2064 24 17 to to TO blog-dshr-org-2064 24 18 act act VB blog-dshr-org-2064 24 19 in in IN blog-dshr-org-2064 24 20 ways way NNS blog-dshr-org-2064 24 21 that that WDT blog-dshr-org-2064 24 22 benefit benefit VBP blog-dshr-org-2064 24 23 them -PRON- PRP blog-dshr-org-2064 24 24 at at IN blog-dshr-org-2064 24 25 the the DT blog-dshr-org-2064 24 26 expense expense NN blog-dshr-org-2064 24 27 of of IN blog-dshr-org-2064 24 28 other other JJ blog-dshr-org-2064 24 29 participants participant NNS blog-dshr-org-2064 24 30 , , , blog-dshr-org-2064 24 31 whereas whereas IN blog-dshr-org-2064 24 32 the the DT blog-dshr-org-2064 24 33 leaderships leadership NNS blog-dshr-org-2064 24 34 of of IN blog-dshr-org-2064 24 35 corporations corporation NNS blog-dshr-org-2064 24 36 and and CC blog-dshr-org-2064 24 37 governments government NNS blog-dshr-org-2064 24 38 collude collude VBP blog-dshr-org-2064 24 39 in in IN blog-dshr-org-2064 24 40 ways way NNS blog-dshr-org-2064 24 41 that that WDT blog-dshr-org-2064 24 42 benefit benefit VBP blog-dshr-org-2064 24 43 themselves -PRON- PRP blog-dshr-org-2064 24 44 but but CC blog-dshr-org-2064 24 45 harm harm VBP blog-dshr-org-2064 24 46 less less RBR blog-dshr-org-2064 24 47 well well RB blog-dshr-org-2064 24 48 - - HYPH blog-dshr-org-2064 24 49 coordinated coordinate VBN blog-dshr-org-2064 24 50 citizens citizen NNS blog-dshr-org-2064 24 51 , , , blog-dshr-org-2064 24 52 customers customer NNS blog-dshr-org-2064 24 53 , , , blog-dshr-org-2064 24 54 employees employee NNS blog-dshr-org-2064 24 55 and and CC blog-dshr-org-2064 24 56 the the DT blog-dshr-org-2064 24 57 general general JJ blog-dshr-org-2064 24 58 public public NN blog-dshr-org-2064 24 59 all all PDT blog-dshr-org-2064 24 60 the the DT blog-dshr-org-2064 24 61 time time NN blog-dshr-org-2064 24 62 . . . blog-dshr-org-2064 25 1 As as IN blog-dshr-org-2064 25 2 regards regard VBZ blog-dshr-org-2064 25 3 fault fault NN blog-dshr-org-2064 25 4 tolerance tolerance NN blog-dshr-org-2064 25 5 , , , blog-dshr-org-2064 25 6 I -PRON- PRP blog-dshr-org-2064 25 7 think think VBP blog-dshr-org-2064 25 8 what what WP blog-dshr-org-2064 25 9 Buterin Buterin NNP blog-dshr-org-2064 25 10 meant mean VBD blog-dshr-org-2064 25 11 by by IN blog-dshr-org-2064 25 12 " " `` blog-dshr-org-2064 25 13 that that WDT blog-dshr-org-2064 25 14 are be VBP blog-dshr-org-2064 25 15 not not RB blog-dshr-org-2064 25 16 likely likely JJ blog-dshr-org-2064 25 17 " " '' blog-dshr-org-2064 25 18 is be VBZ blog-dshr-org-2064 25 19 " " '' blog-dshr-org-2064 25 20 that that WDT blog-dshr-org-2064 25 21 are be VBP blog-dshr-org-2064 25 22 not not RB blog-dshr-org-2064 25 23 likely likely JJ blog-dshr-org-2064 25 24 to to TO blog-dshr-org-2064 25 25 suffer suffer VB blog-dshr-org-2064 25 26 common common JJ blog-dshr-org-2064 25 27 - - HYPH blog-dshr-org-2064 25 28 mode mode NN blog-dshr-org-2064 25 29 failures failure NNS blog-dshr-org-2064 25 30 " " '' blog-dshr-org-2064 25 31 , , , blog-dshr-org-2064 25 32 because because IN blog-dshr-org-2064 25 33 he -PRON- PRP blog-dshr-org-2064 25 34 goes go VBZ blog-dshr-org-2064 25 35 on on RP blog-dshr-org-2064 25 36 to to TO blog-dshr-org-2064 25 37 ask ask VB blog-dshr-org-2064 25 38 : : : blog-dshr-org-2064 25 39 Do do VB blog-dshr-org-2064 25 40 blockchains blockchain NNS blog-dshr-org-2064 25 41 as as IN blog-dshr-org-2064 25 42 they -PRON- PRP blog-dshr-org-2064 25 43 are be VBP blog-dshr-org-2064 25 44 today today NN blog-dshr-org-2064 25 45 manage manage VBP blog-dshr-org-2064 25 46 to to TO blog-dshr-org-2064 25 47 protect protect VB blog-dshr-org-2064 25 48 against against IN blog-dshr-org-2064 25 49 common common JJ blog-dshr-org-2064 25 50 mode mode NN blog-dshr-org-2064 25 51 failure failure NN blog-dshr-org-2064 25 52 ? ? . blog-dshr-org-2064 26 1 Not not RB blog-dshr-org-2064 26 2 necessarily necessarily RB blog-dshr-org-2064 26 3 . . . blog-dshr-org-2064 27 1 Consider consider VB blog-dshr-org-2064 27 2 the the DT blog-dshr-org-2064 27 3 following follow VBG blog-dshr-org-2064 27 4 scenarios scenario NNS blog-dshr-org-2064 27 5 : : : blog-dshr-org-2064 27 6 All all DT blog-dshr-org-2064 27 7 nodes node NNS blog-dshr-org-2064 27 8 in in IN blog-dshr-org-2064 27 9 a a DT blog-dshr-org-2064 27 10 blockchain blockchain NN blog-dshr-org-2064 27 11 run run NN blog-dshr-org-2064 27 12 the the DT blog-dshr-org-2064 27 13 same same JJ blog-dshr-org-2064 27 14 client client NN blog-dshr-org-2064 27 15 software software NN blog-dshr-org-2064 27 16 , , , blog-dshr-org-2064 27 17 and and CC blog-dshr-org-2064 27 18 this this DT blog-dshr-org-2064 27 19 client client NN blog-dshr-org-2064 27 20 software software NN blog-dshr-org-2064 27 21 turns turn VBZ blog-dshr-org-2064 27 22 out out RP blog-dshr-org-2064 27 23 to to TO blog-dshr-org-2064 27 24 have have VB blog-dshr-org-2064 27 25 a a DT blog-dshr-org-2064 27 26 bug bug NN blog-dshr-org-2064 27 27 . . . blog-dshr-org-2064 28 1 All all DT blog-dshr-org-2064 28 2 nodes node NNS blog-dshr-org-2064 28 3 in in IN blog-dshr-org-2064 28 4 a a DT blog-dshr-org-2064 28 5 blockchain blockchain NN blog-dshr-org-2064 28 6 run run NN blog-dshr-org-2064 28 7 the the DT blog-dshr-org-2064 28 8 same same JJ blog-dshr-org-2064 28 9 client client NN blog-dshr-org-2064 28 10 software software NN blog-dshr-org-2064 28 11 , , , blog-dshr-org-2064 28 12 and and CC blog-dshr-org-2064 28 13 the the DT blog-dshr-org-2064 28 14 development development NN blog-dshr-org-2064 28 15 team team NN blog-dshr-org-2064 28 16 of of IN blog-dshr-org-2064 28 17 this this DT blog-dshr-org-2064 28 18 software software NN blog-dshr-org-2064 28 19 turns turn VBZ blog-dshr-org-2064 28 20 out out RP blog-dshr-org-2064 28 21 to to TO blog-dshr-org-2064 28 22 be be VB blog-dshr-org-2064 28 23 socially socially RB blog-dshr-org-2064 28 24 corrupted corrupt VBN blog-dshr-org-2064 28 25 . . . blog-dshr-org-2064 29 1 The the DT blog-dshr-org-2064 29 2 research research NN blog-dshr-org-2064 29 3 team team NN blog-dshr-org-2064 29 4 that that WDT blog-dshr-org-2064 29 5 is be VBZ blog-dshr-org-2064 29 6 proposing propose VBG blog-dshr-org-2064 29 7 protocol protocol NN blog-dshr-org-2064 29 8 upgrades upgrade NNS blog-dshr-org-2064 29 9 turns turn VBZ blog-dshr-org-2064 29 10 out out RP blog-dshr-org-2064 29 11 to to TO blog-dshr-org-2064 29 12 be be VB blog-dshr-org-2064 29 13 socially socially RB blog-dshr-org-2064 29 14 corrupted corrupt VBN blog-dshr-org-2064 29 15 . . . blog-dshr-org-2064 30 1 In in IN blog-dshr-org-2064 30 2 a a DT blog-dshr-org-2064 30 3 proof proof NN blog-dshr-org-2064 30 4 of of IN blog-dshr-org-2064 30 5 work work NN blog-dshr-org-2064 30 6 blockchain blockchain NNP blog-dshr-org-2064 30 7 , , , blog-dshr-org-2064 30 8 70 70 CD blog-dshr-org-2064 30 9 % % NN blog-dshr-org-2064 30 10 of of IN blog-dshr-org-2064 30 11 miners miner NNS blog-dshr-org-2064 30 12 are be VBP blog-dshr-org-2064 30 13 in in IN blog-dshr-org-2064 30 14 the the DT blog-dshr-org-2064 30 15 same same JJ blog-dshr-org-2064 30 16 country country NN blog-dshr-org-2064 30 17 , , , blog-dshr-org-2064 30 18 and and CC blog-dshr-org-2064 30 19 the the DT blog-dshr-org-2064 30 20 government government NN blog-dshr-org-2064 30 21 of of IN blog-dshr-org-2064 30 22 this this DT blog-dshr-org-2064 30 23 country country NN blog-dshr-org-2064 30 24 decides decide VBZ blog-dshr-org-2064 30 25 to to TO blog-dshr-org-2064 30 26 seize seize VB blog-dshr-org-2064 30 27 all all DT blog-dshr-org-2064 30 28 mining mining NN blog-dshr-org-2064 30 29 farms farm NNS blog-dshr-org-2064 30 30 for for IN blog-dshr-org-2064 30 31 national national JJ blog-dshr-org-2064 30 32 security security NN blog-dshr-org-2064 30 33 purposes purpose NNS blog-dshr-org-2064 30 34 . . . blog-dshr-org-2064 31 1 The the DT blog-dshr-org-2064 31 2 majority majority NN blog-dshr-org-2064 31 3 of of IN blog-dshr-org-2064 31 4 mining mining NN blog-dshr-org-2064 31 5 hardware hardware NN blog-dshr-org-2064 31 6 is be VBZ blog-dshr-org-2064 31 7 built build VBN blog-dshr-org-2064 31 8 by by IN blog-dshr-org-2064 31 9 the the DT blog-dshr-org-2064 31 10 same same JJ blog-dshr-org-2064 31 11 company company NN blog-dshr-org-2064 31 12 , , , blog-dshr-org-2064 31 13 and and CC blog-dshr-org-2064 31 14 this this DT blog-dshr-org-2064 31 15 company company NN blog-dshr-org-2064 31 16 gets get VBZ blog-dshr-org-2064 31 17 bribed bribe VBN blog-dshr-org-2064 31 18 or or CC blog-dshr-org-2064 31 19 coerced coerce VBN blog-dshr-org-2064 31 20 into into IN blog-dshr-org-2064 31 21 implementing implement VBG blog-dshr-org-2064 31 22 a a DT blog-dshr-org-2064 31 23 backdoor backdoor NN blog-dshr-org-2064 31 24 that that WDT blog-dshr-org-2064 31 25 allows allow VBZ blog-dshr-org-2064 31 26 this this DT blog-dshr-org-2064 31 27 hardware hardware NN blog-dshr-org-2064 31 28 to to TO blog-dshr-org-2064 31 29 be be VB blog-dshr-org-2064 31 30 shut shut VBN blog-dshr-org-2064 31 31 down down RP blog-dshr-org-2064 31 32 at at IN blog-dshr-org-2064 31 33 will will NN blog-dshr-org-2064 31 34 . . . blog-dshr-org-2064 32 1 In in IN blog-dshr-org-2064 32 2 a a DT blog-dshr-org-2064 32 3 proof proof NN blog-dshr-org-2064 32 4 of of IN blog-dshr-org-2064 32 5 stake stake NNP blog-dshr-org-2064 32 6 blockchain blockchain NNP blog-dshr-org-2064 32 7 , , , blog-dshr-org-2064 32 8 70 70 CD blog-dshr-org-2064 32 9 % % NN blog-dshr-org-2064 32 10 of of IN blog-dshr-org-2064 32 11 the the DT blog-dshr-org-2064 32 12 coins coin NNS blog-dshr-org-2064 32 13 at at IN blog-dshr-org-2064 32 14 stake stake NN blog-dshr-org-2064 32 15 are be VBP blog-dshr-org-2064 32 16 held hold VBN blog-dshr-org-2064 32 17 at at IN blog-dshr-org-2064 32 18 one one CD blog-dshr-org-2064 32 19 exchange exchange NN blog-dshr-org-2064 32 20 . . . blog-dshr-org-2064 33 1 His -PRON- PRP$ blog-dshr-org-2064 33 2 recommendations recommendation NNS blog-dshr-org-2064 33 3 for for IN blog-dshr-org-2064 33 4 improving improve VBG blog-dshr-org-2064 33 5 fault fault NN blog-dshr-org-2064 33 6 tolerance tolerance NN blog-dshr-org-2064 33 7 : : : blog-dshr-org-2064 33 8 are be VBP blog-dshr-org-2064 33 9 fairly fairly RB blog-dshr-org-2064 33 10 obvious obvious JJ blog-dshr-org-2064 33 11 : : : blog-dshr-org-2064 33 12 It -PRON- PRP blog-dshr-org-2064 33 13 is be VBZ blog-dshr-org-2064 33 14 crucially crucially RB blog-dshr-org-2064 33 15 important important JJ blog-dshr-org-2064 33 16 to to TO blog-dshr-org-2064 33 17 have have VB blog-dshr-org-2064 33 18 multiple multiple JJ blog-dshr-org-2064 33 19 competing compete VBG blog-dshr-org-2064 33 20 implementations implementation NNS blog-dshr-org-2064 33 21 . . . blog-dshr-org-2064 34 1 The the DT blog-dshr-org-2064 34 2 knowledge knowledge NN blog-dshr-org-2064 34 3 of of IN blog-dshr-org-2064 34 4 the the DT blog-dshr-org-2064 34 5 technical technical JJ blog-dshr-org-2064 34 6 considerations consideration NNS blog-dshr-org-2064 34 7 behind behind IN blog-dshr-org-2064 34 8 protocol protocol NN blog-dshr-org-2064 34 9 upgrades upgrade NNS blog-dshr-org-2064 34 10 must must MD blog-dshr-org-2064 34 11 be be VB blog-dshr-org-2064 34 12 democratized democratize VBN blog-dshr-org-2064 34 13 , , , blog-dshr-org-2064 34 14 so so IN blog-dshr-org-2064 34 15 that that IN blog-dshr-org-2064 34 16 more more JJR blog-dshr-org-2064 34 17 people people NNS blog-dshr-org-2064 34 18 can can MD blog-dshr-org-2064 34 19 feel feel VB blog-dshr-org-2064 34 20 comfortable comfortable JJ blog-dshr-org-2064 34 21 participating participate VBG blog-dshr-org-2064 34 22 in in IN blog-dshr-org-2064 34 23 research research NN blog-dshr-org-2064 34 24 discussions discussion NNS blog-dshr-org-2064 34 25 and and CC blog-dshr-org-2064 34 26 criticizing criticize VBG blog-dshr-org-2064 34 27 protocol protocol NN blog-dshr-org-2064 34 28 changes change NNS blog-dshr-org-2064 34 29 that that WDT blog-dshr-org-2064 34 30 are be VBP blog-dshr-org-2064 34 31 clearly clearly RB blog-dshr-org-2064 34 32 bad bad JJ blog-dshr-org-2064 34 33 . . . blog-dshr-org-2064 35 1 Core core NN blog-dshr-org-2064 35 2 developers developer NNS blog-dshr-org-2064 35 3 and and CC blog-dshr-org-2064 35 4 researchers researcher NNS blog-dshr-org-2064 35 5 should should MD blog-dshr-org-2064 35 6 be be VB blog-dshr-org-2064 35 7 employed employ VBN blog-dshr-org-2064 35 8 by by IN blog-dshr-org-2064 35 9 multiple multiple JJ blog-dshr-org-2064 35 10 companies company NNS blog-dshr-org-2064 35 11 or or CC blog-dshr-org-2064 35 12 organizations organization NNS blog-dshr-org-2064 35 13 ( ( -LRB- blog-dshr-org-2064 35 14 or or CC blog-dshr-org-2064 35 15 , , , blog-dshr-org-2064 35 16 alternatively alternatively RB blog-dshr-org-2064 35 17 , , , blog-dshr-org-2064 35 18 many many JJ blog-dshr-org-2064 35 19 of of IN blog-dshr-org-2064 35 20 them -PRON- PRP blog-dshr-org-2064 35 21 can can MD blog-dshr-org-2064 35 22 be be VB blog-dshr-org-2064 35 23 volunteers volunteer NNS blog-dshr-org-2064 35 24 ) ) -RRB- blog-dshr-org-2064 35 25 . . . blog-dshr-org-2064 36 1 Mining mining NN blog-dshr-org-2064 36 2 algorithms algorithm NNS blog-dshr-org-2064 36 3 should should MD blog-dshr-org-2064 36 4 be be VB blog-dshr-org-2064 36 5 designed design VBN blog-dshr-org-2064 36 6 in in IN blog-dshr-org-2064 36 7 a a DT blog-dshr-org-2064 36 8 way way NN blog-dshr-org-2064 36 9 that that WDT blog-dshr-org-2064 36 10 minimizes minimize VBZ blog-dshr-org-2064 36 11 the the DT blog-dshr-org-2064 36 12 risk risk NN blog-dshr-org-2064 36 13 of of IN blog-dshr-org-2064 36 14 centralization centralization NN blog-dshr-org-2064 36 15 Ideally ideally RB blog-dshr-org-2064 36 16 we -PRON- PRP blog-dshr-org-2064 36 17 use use VBP blog-dshr-org-2064 36 18 proof proof NN blog-dshr-org-2064 36 19 of of IN blog-dshr-org-2064 36 20 stake stake NN blog-dshr-org-2064 36 21 to to TO blog-dshr-org-2064 36 22 move move VB blog-dshr-org-2064 36 23 away away RB blog-dshr-org-2064 36 24 from from IN blog-dshr-org-2064 36 25 hardware hardware NN blog-dshr-org-2064 36 26 centralization centralization NN blog-dshr-org-2064 36 27 risk risk NN blog-dshr-org-2064 36 28 entirely entirely RB blog-dshr-org-2064 36 29 ( ( -LRB- blog-dshr-org-2064 36 30 though though IN blog-dshr-org-2064 36 31 we -PRON- PRP blog-dshr-org-2064 36 32 should should MD blog-dshr-org-2064 36 33 also also RB blog-dshr-org-2064 36 34 be be VB blog-dshr-org-2064 36 35 cautious cautious JJ blog-dshr-org-2064 36 36 of of IN blog-dshr-org-2064 36 37 new new JJ blog-dshr-org-2064 36 38 risks risk NNS blog-dshr-org-2064 36 39 that that WDT blog-dshr-org-2064 36 40 pop pop VBP blog-dshr-org-2064 36 41 up up RP blog-dshr-org-2064 36 42 due due IN blog-dshr-org-2064 36 43 to to IN blog-dshr-org-2064 36 44 proof proof NN blog-dshr-org-2064 36 45 of of IN blog-dshr-org-2064 36 46 stake stake NN blog-dshr-org-2064 36 47 ) ) -RRB- blog-dshr-org-2064 36 48 . . . blog-dshr-org-2064 37 1 They -PRON- PRP blog-dshr-org-2064 37 2 may may MD blog-dshr-org-2064 37 3 be be VB blog-dshr-org-2064 37 4 " " `` blog-dshr-org-2064 37 5 fairly fairly RB blog-dshr-org-2064 37 6 obvious obvious JJ blog-dshr-org-2064 37 7 " " '' blog-dshr-org-2064 37 8 but but CC blog-dshr-org-2064 37 9 some some DT blog-dshr-org-2064 37 10 of of IN blog-dshr-org-2064 37 11 them -PRON- PRP blog-dshr-org-2064 37 12 are be VBP blog-dshr-org-2064 37 13 very very RB blog-dshr-org-2064 37 14 hard hard JJ blog-dshr-org-2064 37 15 to to TO blog-dshr-org-2064 37 16 achieve achieve VB blog-dshr-org-2064 37 17 in in IN blog-dshr-org-2064 37 18 the the DT blog-dshr-org-2064 37 19 real real JJ blog-dshr-org-2064 37 20 world world NN blog-dshr-org-2064 37 21 . . . blog-dshr-org-2064 38 1 For for IN blog-dshr-org-2064 38 2 example example NN blog-dshr-org-2064 38 3 : : : blog-dshr-org-2064 38 4 What what WP blog-dshr-org-2064 38 5 matters matter NNS blog-dshr-org-2064 38 6 is be VBZ blog-dshr-org-2064 38 7 n't not RB blog-dshr-org-2064 38 8 that that IN blog-dshr-org-2064 38 9 there there EX blog-dshr-org-2064 38 10 are be VBP blog-dshr-org-2064 38 11 multiple multiple JJ blog-dshr-org-2064 38 12 competing compete VBG blog-dshr-org-2064 38 13 implementations implementation NNS blog-dshr-org-2064 38 14 , , , blog-dshr-org-2064 38 15 but but CC blog-dshr-org-2064 38 16 rather rather RB blog-dshr-org-2064 38 17 what what WP blog-dshr-org-2064 38 18 fraction fraction NN blog-dshr-org-2064 38 19 of of IN blog-dshr-org-2064 38 20 the the DT blog-dshr-org-2064 38 21 network network NN blog-dshr-org-2064 38 22 's 's POS blog-dshr-org-2064 38 23 resources resource NNS blog-dshr-org-2064 38 24 use use VBP blog-dshr-org-2064 38 25 the the DT blog-dshr-org-2064 38 26 most most RBS blog-dshr-org-2064 38 27 common common JJ blog-dshr-org-2064 38 28 implementation implementation NN blog-dshr-org-2064 38 29 . . . blog-dshr-org-2064 39 1 Pointing pointing NN blog-dshr-org-2064 39 2 , , , blog-dshr-org-2064 39 3 as as IN blog-dshr-org-2064 39 4 Buterin Buterin NNP blog-dshr-org-2064 39 5 does do VBZ blog-dshr-org-2064 39 6 , , , blog-dshr-org-2064 39 7 to to IN blog-dshr-org-2064 39 8 a a DT blog-dshr-org-2064 39 9 list list NN blog-dshr-org-2064 39 10 of of IN blog-dshr-org-2064 39 11 implementations implementation NNS blog-dshr-org-2064 39 12 of of IN blog-dshr-org-2064 39 13 the the DT blog-dshr-org-2064 39 14 Ethereum Ethereum NNP blog-dshr-org-2064 39 15 protocol protocol NN blog-dshr-org-2064 39 16 ( ( -LRB- blog-dshr-org-2064 39 17 some some DT blog-dshr-org-2064 39 18 of of IN blog-dshr-org-2064 39 19 which which WDT blog-dshr-org-2064 39 20 are be VBP blog-dshr-org-2064 39 21 apparently apparently RB blog-dshr-org-2064 39 22 abandoned abandon VBN blog-dshr-org-2064 39 23 ) ) -RRB- blog-dshr-org-2064 39 24 is be VBZ blog-dshr-org-2064 39 25 interesting interesting JJ blog-dshr-org-2064 39 26 but but CC blog-dshr-org-2064 39 27 if if IN blog-dshr-org-2064 39 28 the the DT blog-dshr-org-2064 39 29 majority majority NN blog-dshr-org-2064 39 30 of of IN blog-dshr-org-2064 39 31 mining mining NN blog-dshr-org-2064 39 32 power power NN blog-dshr-org-2064 39 33 runs run VBZ blog-dshr-org-2064 39 34 one one CD blog-dshr-org-2064 39 35 of of IN blog-dshr-org-2064 39 36 them -PRON- PRP blog-dshr-org-2064 39 37 the the DT blog-dshr-org-2064 39 38 network network NN blog-dshr-org-2064 39 39 is be VBZ blog-dshr-org-2064 39 40 vulnerable vulnerable JJ blog-dshr-org-2064 39 41 . . . blog-dshr-org-2064 40 1 Since since IN blog-dshr-org-2064 40 2 one one CD blog-dshr-org-2064 40 3 of of IN blog-dshr-org-2064 40 4 them -PRON- PRP blog-dshr-org-2064 40 5 is be VBZ blog-dshr-org-2064 40 6 likely likely JJ blog-dshr-org-2064 40 7 to to TO blog-dshr-org-2064 40 8 be be VB blog-dshr-org-2064 40 9 more more RBR blog-dshr-org-2064 40 10 efficient efficient JJ blog-dshr-org-2064 40 11 than than IN blog-dshr-org-2064 40 12 the the DT blog-dshr-org-2064 40 13 others other NNS blog-dshr-org-2064 40 14 , , , blog-dshr-org-2064 40 15 a a DT blog-dshr-org-2064 40 16 monoculture monoculture NN blog-dshr-org-2064 40 17 is be VBZ blog-dshr-org-2064 40 18 likely likely JJ blog-dshr-org-2064 40 19 to to TO blog-dshr-org-2064 40 20 arise arise VB blog-dshr-org-2064 40 21 . . . blog-dshr-org-2064 41 1 Similarly similarly RB blog-dshr-org-2064 41 2 , , , blog-dshr-org-2064 41 3 the the DT blog-dshr-org-2064 41 4 employment employment NN blog-dshr-org-2064 41 5 or or CC blog-dshr-org-2064 41 6 volunteer volunteer NN blog-dshr-org-2064 41 7 status status NN blog-dshr-org-2064 41 8 of of IN blog-dshr-org-2064 41 9 the the DT blog-dshr-org-2064 41 10 " " `` blog-dshr-org-2064 41 11 core core NN blog-dshr-org-2064 41 12 developers developer NNS blog-dshr-org-2064 41 13 and and CC blog-dshr-org-2064 41 14 researchers researcher NNS blog-dshr-org-2064 41 15 " " `` blog-dshr-org-2064 41 16 is be VBZ blog-dshr-org-2064 41 17 n't not RB blog-dshr-org-2064 41 18 very very RB blog-dshr-org-2064 41 19 important important JJ blog-dshr-org-2064 41 20 if if IN blog-dshr-org-2064 41 21 they -PRON- PRP blog-dshr-org-2064 41 22 are be VBP blog-dshr-org-2064 41 23 vulnerable vulnerable JJ blog-dshr-org-2064 41 24 to to IN blog-dshr-org-2064 41 25 the the DT blog-dshr-org-2064 41 26 kind kind NN blog-dshr-org-2064 41 27 of of IN blog-dshr-org-2064 41 28 group group NN blog-dshr-org-2064 41 29 - - : blog-dshr-org-2064 41 30 think think VBP blog-dshr-org-2064 41 31 that that IN blog-dshr-org-2064 41 32 we -PRON- PRP blog-dshr-org-2064 41 33 see see VBP blog-dshr-org-2064 41 34 in in IN blog-dshr-org-2064 41 35 the the DT blog-dshr-org-2064 41 36 Bitcoin Bitcoin NNP blog-dshr-org-2064 41 37 community community NN blog-dshr-org-2064 41 38 . . . blog-dshr-org-2064 42 1 While while IN blog-dshr-org-2064 42 2 it -PRON- PRP blog-dshr-org-2064 42 3 is be VBZ blog-dshr-org-2064 42 4 true true JJ blog-dshr-org-2064 42 5 that that IN blog-dshr-org-2064 42 6 the the DT blog-dshr-org-2064 42 7 Ethereum Ethereum NNP blog-dshr-org-2064 42 8 mining mining NN blog-dshr-org-2064 42 9 algorithm algorithm NN blog-dshr-org-2064 42 10 is be VBZ blog-dshr-org-2064 42 11 designed design VBN blog-dshr-org-2064 42 12 to to TO blog-dshr-org-2064 42 13 enable enable VB blog-dshr-org-2064 42 14 smaller small JJR blog-dshr-org-2064 42 15 miners miner NNS blog-dshr-org-2064 42 16 to to TO blog-dshr-org-2064 42 17 function function VB blog-dshr-org-2064 42 18 , , , blog-dshr-org-2064 42 19 it -PRON- PRP blog-dshr-org-2064 42 20 does do VBZ blog-dshr-org-2064 42 21 n't not RB blog-dshr-org-2064 42 22 address address VB blog-dshr-org-2064 42 23 the the DT blog-dshr-org-2064 42 24 centralizing centralize VBG blog-dshr-org-2064 42 25 force force NN blog-dshr-org-2064 42 26 I -PRON- PRP blog-dshr-org-2064 42 27 described describe VBD blog-dshr-org-2064 42 28 in in IN blog-dshr-org-2064 42 29 Economies Economies NNPS blog-dshr-org-2064 42 30 of of IN blog-dshr-org-2064 42 31 Scale Scale NNP blog-dshr-org-2064 42 32 in in IN blog-dshr-org-2064 42 33 Peer Peer NNP blog-dshr-org-2064 42 34 - - HYPH blog-dshr-org-2064 42 35 to to IN blog-dshr-org-2064 42 36 - - HYPH blog-dshr-org-2064 42 37 Peer Peer NNP blog-dshr-org-2064 42 38 Networks Networks NNPS blog-dshr-org-2064 42 39 . . . blog-dshr-org-2064 43 1 If if IN blog-dshr-org-2064 43 2 smaller small JJR blog-dshr-org-2064 43 3 mining mining NN blog-dshr-org-2064 43 4 nodes node NNS blog-dshr-org-2064 43 5 are be VBP blog-dshr-org-2064 43 6 more more RBR blog-dshr-org-2064 43 7 cost cost NN blog-dshr-org-2064 43 8 - - HYPH blog-dshr-org-2064 43 9 effective effective JJ blog-dshr-org-2064 43 10 , , , blog-dshr-org-2064 43 11 economies economy NNS blog-dshr-org-2064 43 12 of of IN blog-dshr-org-2064 43 13 scale scale NN blog-dshr-org-2064 43 14 will will MD blog-dshr-org-2064 43 15 drive drive VB blog-dshr-org-2064 43 16 the the DT blog-dshr-org-2064 43 17 network network NN blog-dshr-org-2064 43 18 to to TO blog-dshr-org-2064 43 19 be be VB blog-dshr-org-2064 43 20 dominated dominate VBN blog-dshr-org-2064 43 21 by by IN blog-dshr-org-2064 43 22 large large JJ blog-dshr-org-2064 43 23 collections collection NNS blog-dshr-org-2064 43 24 of of IN blog-dshr-org-2064 43 25 smaller small JJR blog-dshr-org-2064 43 26 mining mining NN blog-dshr-org-2064 43 27 nodes node NNS blog-dshr-org-2064 43 28 under under IN blog-dshr-org-2064 43 29 unified unified JJ blog-dshr-org-2064 43 30 control control NN blog-dshr-org-2064 43 31 . . . blog-dshr-org-2064 44 1 If if IN blog-dshr-org-2064 44 2 they -PRON- PRP blog-dshr-org-2064 44 3 are be VBP blog-dshr-org-2064 44 4 n't not RB blog-dshr-org-2064 44 5 more more RBR blog-dshr-org-2064 44 6 cost cost NN blog-dshr-org-2064 44 7 - - HYPH blog-dshr-org-2064 44 8 effective effective JJ blog-dshr-org-2064 44 9 , , , blog-dshr-org-2064 44 10 the the DT blog-dshr-org-2064 44 11 network network NN blog-dshr-org-2064 44 12 will will MD blog-dshr-org-2064 44 13 be be VB blog-dshr-org-2064 44 14 dominated dominate VBN blog-dshr-org-2064 44 15 by by IN blog-dshr-org-2064 44 16 collections collection NNS blog-dshr-org-2064 44 17 of of IN blog-dshr-org-2064 44 18 larger large JJR blog-dshr-org-2064 44 19 mining mining NN blog-dshr-org-2064 44 20 nodes node NNS blog-dshr-org-2064 44 21 under under IN blog-dshr-org-2064 44 22 unified unified JJ blog-dshr-org-2064 44 23 control control NN blog-dshr-org-2064 44 24 . . . blog-dshr-org-2064 45 1 Either either DT blog-dshr-org-2064 45 2 way way NN blog-dshr-org-2064 45 3 , , , blog-dshr-org-2064 45 4 you -PRON- PRP blog-dshr-org-2064 45 5 get get VBP blog-dshr-org-2064 45 6 political political JJ blog-dshr-org-2064 45 7 centralization centralization NN blog-dshr-org-2064 45 8 and and CC blog-dshr-org-2064 45 9 lose lose VB blog-dshr-org-2064 45 10 attack attack NN blog-dshr-org-2064 45 11 resistance resistance NN blog-dshr-org-2064 45 12 . . . blog-dshr-org-2064 46 1 The the DT blog-dshr-org-2064 46 2 result result NN blog-dshr-org-2064 46 3 is be VBZ blog-dshr-org-2064 46 4 , , , blog-dshr-org-2064 46 5 as as IN blog-dshr-org-2064 46 6 Buterin Buterin NNP blog-dshr-org-2064 46 7 points point VBZ blog-dshr-org-2064 46 8 out out RP blog-dshr-org-2064 46 9 , , , blog-dshr-org-2064 46 10 that that IN blog-dshr-org-2064 46 11 the the DT blog-dshr-org-2064 46 12 vaunted vaunted JJ blog-dshr-org-2064 46 13 attack attack NN blog-dshr-org-2064 46 14 resistance resistance NN blog-dshr-org-2064 46 15 of of IN blog-dshr-org-2064 46 16 proof proof NN blog-dshr-org-2064 46 17 - - HYPH blog-dshr-org-2064 46 18 of of IN blog-dshr-org-2064 46 19 - - HYPH blog-dshr-org-2064 46 20 work work NN blog-dshr-org-2064 46 21 blockchains blockchain NNS blog-dshr-org-2064 46 22 like like IN blog-dshr-org-2064 46 23 Bitcoin Bitcoin NNP blog-dshr-org-2064 46 24 's 's POS blog-dshr-org-2064 46 25 is be VBZ blog-dshr-org-2064 46 26 less less JJR blog-dshr-org-2064 46 27 than than IN blog-dshr-org-2064 46 28 credible credible JJ blog-dshr-org-2064 46 29 : : : blog-dshr-org-2064 46 30 In in IN blog-dshr-org-2064 46 31 the the DT blog-dshr-org-2064 46 32 case case NN blog-dshr-org-2064 46 33 of of IN blog-dshr-org-2064 46 34 blockchain blockchain NNP blog-dshr-org-2064 46 35 protocols protocol NNS blog-dshr-org-2064 46 36 , , , blog-dshr-org-2064 46 37 the the DT blog-dshr-org-2064 46 38 mathematical mathematical JJ blog-dshr-org-2064 46 39 and and CC blog-dshr-org-2064 46 40 economic economic JJ blog-dshr-org-2064 46 41 reasoning reasoning NN blog-dshr-org-2064 46 42 behind behind IN blog-dshr-org-2064 46 43 the the DT blog-dshr-org-2064 46 44 safety safety NN blog-dshr-org-2064 46 45 of of IN blog-dshr-org-2064 46 46 the the DT blog-dshr-org-2064 46 47 consensus consensus NN blog-dshr-org-2064 46 48 often often RB blog-dshr-org-2064 46 49 relies rely VBZ blog-dshr-org-2064 46 50 crucially crucially RB blog-dshr-org-2064 46 51 on on IN blog-dshr-org-2064 46 52 the the DT blog-dshr-org-2064 46 53 uncoordinated uncoordinated JJ blog-dshr-org-2064 46 54 choice choice NN blog-dshr-org-2064 46 55 model model NN blog-dshr-org-2064 46 56 , , , blog-dshr-org-2064 46 57 or or CC blog-dshr-org-2064 46 58 the the DT blog-dshr-org-2064 46 59 assumption assumption NN blog-dshr-org-2064 46 60 that that IN blog-dshr-org-2064 46 61 the the DT blog-dshr-org-2064 46 62 game game NN blog-dshr-org-2064 46 63 consists consist VBZ blog-dshr-org-2064 46 64 of of IN blog-dshr-org-2064 46 65 many many JJ blog-dshr-org-2064 46 66 small small JJ blog-dshr-org-2064 46 67 actors actor NNS blog-dshr-org-2064 46 68 that that WDT blog-dshr-org-2064 46 69 make make VBP blog-dshr-org-2064 46 70 decisions decision NNS blog-dshr-org-2064 46 71 independently independently RB blog-dshr-org-2064 46 72 . . . blog-dshr-org-2064 47 1 If if IN blog-dshr-org-2064 47 2 any any DT blog-dshr-org-2064 47 3 one one CD blog-dshr-org-2064 47 4 actor actor NN blog-dshr-org-2064 47 5 gets get VBZ blog-dshr-org-2064 47 6 more more JJR blog-dshr-org-2064 47 7 than than IN blog-dshr-org-2064 47 8 1/3 1/3 CD blog-dshr-org-2064 47 9 of of IN blog-dshr-org-2064 47 10 the the DT blog-dshr-org-2064 47 11 mining mining NN blog-dshr-org-2064 47 12 power power NN blog-dshr-org-2064 47 13 in in IN blog-dshr-org-2064 47 14 a a DT blog-dshr-org-2064 47 15 proof proof NN blog-dshr-org-2064 47 16 of of IN blog-dshr-org-2064 47 17 work work NN blog-dshr-org-2064 47 18 system system NN blog-dshr-org-2064 47 19 , , , blog-dshr-org-2064 47 20 they -PRON- PRP blog-dshr-org-2064 47 21 can can MD blog-dshr-org-2064 47 22 gain gain VB blog-dshr-org-2064 47 23 outsized outsized JJ blog-dshr-org-2064 47 24 profits profit NNS blog-dshr-org-2064 47 25 by by IN blog-dshr-org-2064 47 26 selfish selfish NN blog-dshr-org-2064 47 27 - - HYPH blog-dshr-org-2064 47 28 mining mining NN blog-dshr-org-2064 47 29 . . . blog-dshr-org-2064 48 1 However however RB blog-dshr-org-2064 48 2 , , , blog-dshr-org-2064 48 3 can can MD blog-dshr-org-2064 48 4 we -PRON- PRP blog-dshr-org-2064 48 5 really really RB blog-dshr-org-2064 48 6 say say VB blog-dshr-org-2064 48 7 that that IN blog-dshr-org-2064 48 8 the the DT blog-dshr-org-2064 48 9 uncoordinated uncoordinated JJ blog-dshr-org-2064 48 10 choice choice NN blog-dshr-org-2064 48 11 model model NN blog-dshr-org-2064 48 12 is be VBZ blog-dshr-org-2064 48 13 realistic realistic JJ blog-dshr-org-2064 48 14 when when WRB blog-dshr-org-2064 48 15 90 90 CD blog-dshr-org-2064 48 16 % % NN blog-dshr-org-2064 48 17 of of IN blog-dshr-org-2064 48 18 the the DT blog-dshr-org-2064 48 19 Bitcoin Bitcoin NNP blog-dshr-org-2064 48 20 network network NN blog-dshr-org-2064 48 21 ’s ’s POS blog-dshr-org-2064 48 22 mining mining NN blog-dshr-org-2064 48 23 power power NN blog-dshr-org-2064 48 24 is be VBZ blog-dshr-org-2064 48 25 well well RB blog-dshr-org-2064 48 26 - - HYPH blog-dshr-org-2064 48 27 coordinated coordinated JJ blog-dshr-org-2064 48 28 enough enough RB blog-dshr-org-2064 48 29 to to TO blog-dshr-org-2064 48 30 show show VB blog-dshr-org-2064 48 31 up up RP blog-dshr-org-2064 48 32 together together RB blog-dshr-org-2064 48 33 at at IN blog-dshr-org-2064 48 34 the the DT blog-dshr-org-2064 48 35 same same JJ blog-dshr-org-2064 48 36 conference conference NN blog-dshr-org-2064 48 37 ? ? . blog-dshr-org-2064 49 1 But but CC blog-dshr-org-2064 49 2 it -PRON- PRP blog-dshr-org-2064 49 3 turns turn VBZ blog-dshr-org-2064 49 4 out out RP blog-dshr-org-2064 49 5 that that IN blog-dshr-org-2064 49 6 coordination coordination NN blog-dshr-org-2064 49 7 is be VBZ blog-dshr-org-2064 49 8 a a DT blog-dshr-org-2064 49 9 double double JJ blog-dshr-org-2064 49 10 - - HYPH blog-dshr-org-2064 49 11 edged edged JJ blog-dshr-org-2064 49 12 sword sword NN blog-dshr-org-2064 49 13 : : : blog-dshr-org-2064 49 14 Many many JJ blog-dshr-org-2064 49 15 communities community NNS blog-dshr-org-2064 49 16 , , , blog-dshr-org-2064 49 17 including include VBG blog-dshr-org-2064 49 18 Ethereum Ethereum NNP blog-dshr-org-2064 49 19 ’s ’s POS blog-dshr-org-2064 49 20 , , , blog-dshr-org-2064 49 21 are be VBP blog-dshr-org-2064 49 22 often often RB blog-dshr-org-2064 49 23 praised praise VBN blog-dshr-org-2064 49 24 for for IN blog-dshr-org-2064 49 25 having have VBG blog-dshr-org-2064 49 26 a a DT blog-dshr-org-2064 49 27 strong strong JJ blog-dshr-org-2064 49 28 community community NN blog-dshr-org-2064 49 29 spirit spirit NN blog-dshr-org-2064 49 30 and and CC blog-dshr-org-2064 49 31 being be VBG blog-dshr-org-2064 49 32 able able JJ blog-dshr-org-2064 49 33 to to TO blog-dshr-org-2064 49 34 coordinate coordinate VB blog-dshr-org-2064 49 35 quickly quickly RB blog-dshr-org-2064 49 36 on on IN blog-dshr-org-2064 49 37 implementing implement VBG blog-dshr-org-2064 49 38 , , , blog-dshr-org-2064 49 39 releasing release VBG blog-dshr-org-2064 49 40 and and CC blog-dshr-org-2064 49 41 activating activate VBG blog-dshr-org-2064 49 42 a a DT blog-dshr-org-2064 49 43 hard hard JJ blog-dshr-org-2064 49 44 fork fork NN blog-dshr-org-2064 49 45 to to TO blog-dshr-org-2064 49 46 fix fix VB blog-dshr-org-2064 49 47 denial denial NN blog-dshr-org-2064 49 48 - - HYPH blog-dshr-org-2064 49 49 of of IN blog-dshr-org-2064 49 50 - - HYPH blog-dshr-org-2064 49 51 service service NN blog-dshr-org-2064 49 52 issues issue NNS blog-dshr-org-2064 49 53 in in IN blog-dshr-org-2064 49 54 the the DT blog-dshr-org-2064 49 55 protocol protocol NN blog-dshr-org-2064 49 56 within within IN blog-dshr-org-2064 49 57 six six CD blog-dshr-org-2064 49 58 days day NNS blog-dshr-org-2064 49 59 . . . blog-dshr-org-2064 50 1 But but CC blog-dshr-org-2064 50 2 how how WRB blog-dshr-org-2064 50 3 can can MD blog-dshr-org-2064 50 4 we -PRON- PRP blog-dshr-org-2064 50 5 foster foster VB blog-dshr-org-2064 50 6 and and CC blog-dshr-org-2064 50 7 improve improve VB blog-dshr-org-2064 50 8 this this DT blog-dshr-org-2064 50 9 good good JJ blog-dshr-org-2064 50 10 kind kind NN blog-dshr-org-2064 50 11 of of IN blog-dshr-org-2064 50 12 coordination coordination NN blog-dshr-org-2064 50 13 , , , blog-dshr-org-2064 50 14 but but CC blog-dshr-org-2064 50 15 at at IN blog-dshr-org-2064 50 16 the the DT blog-dshr-org-2064 50 17 same same JJ blog-dshr-org-2064 50 18 time time NN blog-dshr-org-2064 50 19 prevent prevent NN blog-dshr-org-2064 50 20 “ " `` blog-dshr-org-2064 50 21 bad bad JJ blog-dshr-org-2064 50 22 coordination coordination NN blog-dshr-org-2064 50 23 ” " '' blog-dshr-org-2064 50 24 that that WDT blog-dshr-org-2064 50 25 consists consist VBZ blog-dshr-org-2064 50 26 of of IN blog-dshr-org-2064 50 27 miners miner NNS blog-dshr-org-2064 50 28 trying try VBG blog-dshr-org-2064 50 29 to to TO blog-dshr-org-2064 50 30 screw screw VB blog-dshr-org-2064 50 31 everyone everyone NN blog-dshr-org-2064 50 32 else else RB blog-dshr-org-2064 50 33 over over RB blog-dshr-org-2064 50 34 by by IN blog-dshr-org-2064 50 35 repeatedly repeatedly RB blog-dshr-org-2064 50 36 coordinating coordinate VBG blog-dshr-org-2064 50 37 51 51 CD blog-dshr-org-2064 50 38 % % NN blog-dshr-org-2064 50 39 attacks attack NNS blog-dshr-org-2064 50 40 ? ? . blog-dshr-org-2064 51 1 And and CC blog-dshr-org-2064 51 2 this this DT blog-dshr-org-2064 51 3 makes make VBZ blog-dshr-org-2064 51 4 resisting resist VBG blog-dshr-org-2064 51 5 collusion collusion NN blog-dshr-org-2064 51 6 hard hard RB blog-dshr-org-2064 51 7 : : : blog-dshr-org-2064 51 8 Collusion collusion NN blog-dshr-org-2064 51 9 is be VBZ blog-dshr-org-2064 51 10 difficult difficult JJ blog-dshr-org-2064 51 11 to to TO blog-dshr-org-2064 51 12 define define VB blog-dshr-org-2064 51 13 ; ; : blog-dshr-org-2064 51 14 perhaps perhaps RB blog-dshr-org-2064 51 15 the the DT blog-dshr-org-2064 51 16 only only JJ blog-dshr-org-2064 51 17 truly truly RB blog-dshr-org-2064 51 18 valid valid JJ blog-dshr-org-2064 51 19 way way NN blog-dshr-org-2064 51 20 to to TO blog-dshr-org-2064 51 21 put put VB blog-dshr-org-2064 51 22 it -PRON- PRP blog-dshr-org-2064 51 23 is be VBZ blog-dshr-org-2064 51 24 to to TO blog-dshr-org-2064 51 25 simply simply RB blog-dshr-org-2064 51 26 say say VB blog-dshr-org-2064 51 27 that that IN blog-dshr-org-2064 51 28 collusion collusion NN blog-dshr-org-2064 51 29 is be VBZ blog-dshr-org-2064 51 30 “ " `` blog-dshr-org-2064 51 31 coordination coordination NN blog-dshr-org-2064 51 32 that that WDT blog-dshr-org-2064 51 33 we -PRON- PRP blog-dshr-org-2064 51 34 do do VBP blog-dshr-org-2064 51 35 n’t not RB blog-dshr-org-2064 51 36 like like VB blog-dshr-org-2064 51 37 ” " '' blog-dshr-org-2064 51 38 . . . blog-dshr-org-2064 52 1 There there EX blog-dshr-org-2064 52 2 are be VBP blog-dshr-org-2064 52 3 many many JJ blog-dshr-org-2064 52 4 situations situation NNS blog-dshr-org-2064 52 5 in in IN blog-dshr-org-2064 52 6 real real JJ blog-dshr-org-2064 52 7 life life NN blog-dshr-org-2064 52 8 where where WRB blog-dshr-org-2064 52 9 even even RB blog-dshr-org-2064 52 10 though though IN blog-dshr-org-2064 52 11 having have VBG blog-dshr-org-2064 52 12 perfect perfect JJ blog-dshr-org-2064 52 13 coordination coordination NN blog-dshr-org-2064 52 14 between between IN blog-dshr-org-2064 52 15 everyone everyone NN blog-dshr-org-2064 52 16 would would MD blog-dshr-org-2064 52 17 be be VB blog-dshr-org-2064 52 18 ideal ideal JJ blog-dshr-org-2064 52 19 , , , blog-dshr-org-2064 52 20 one one CD blog-dshr-org-2064 52 21 sub sub NN blog-dshr-org-2064 52 22 - - NN blog-dshr-org-2064 52 23 group group NN blog-dshr-org-2064 52 24 being be VBG blog-dshr-org-2064 52 25 able able JJ blog-dshr-org-2064 52 26 to to TO blog-dshr-org-2064 52 27 coordinate coordinate VB blog-dshr-org-2064 52 28 while while IN blog-dshr-org-2064 52 29 the the DT blog-dshr-org-2064 52 30 others other NNS blog-dshr-org-2064 52 31 can can MD blog-dshr-org-2064 52 32 not not RB blog-dshr-org-2064 52 33 is be VBZ blog-dshr-org-2064 52 34 dangerous dangerous JJ blog-dshr-org-2064 52 35 . . . blog-dshr-org-2064 53 1 As as IN blog-dshr-org-2064 53 2 Tonto Tonto NNP blog-dshr-org-2064 53 3 said say VBD blog-dshr-org-2064 53 4 to to IN blog-dshr-org-2064 53 5 the the DT blog-dshr-org-2064 53 6 Lone Lone NNP blog-dshr-org-2064 53 7 Ranger Ranger NNP blog-dshr-org-2064 53 8 , , , blog-dshr-org-2064 53 9 " " `` blog-dshr-org-2064 53 10 What what WP blog-dshr-org-2064 53 11 do do VBP blog-dshr-org-2064 53 12 you -PRON- PRP blog-dshr-org-2064 53 13 mean mean VB blog-dshr-org-2064 53 14 we -PRON- PRP blog-dshr-org-2064 53 15 , , , blog-dshr-org-2064 53 16 white white JJ blog-dshr-org-2064 53 17 man man NN blog-dshr-org-2064 53 18 ? ? . blog-dshr-org-2064 53 19 " " '' blog-dshr-org-2064 54 1 Our -PRON- PRP$ blog-dshr-org-2064 54 2 SOSP SOSP NNP blog-dshr-org-2064 54 3 paper paper NN blog-dshr-org-2064 54 4 showed show VBD blog-dshr-org-2064 54 5 how how WRB blog-dshr-org-2064 54 6 , , , blog-dshr-org-2064 54 7 given give VBN blog-dshr-org-2064 54 8 a a DT blog-dshr-org-2064 54 9 large large JJ blog-dshr-org-2064 54 10 surplus surplus NN blog-dshr-org-2064 54 11 of of IN blog-dshr-org-2064 54 12 replicas replicas NN blog-dshr-org-2064 54 13 , , , blog-dshr-org-2064 54 14 the the DT blog-dshr-org-2064 54 15 LOCKSS LOCKSS NNP blog-dshr-org-2064 54 16 polling polling NN blog-dshr-org-2064 54 17 protocol protocol NN blog-dshr-org-2064 54 18 made make VBD blog-dshr-org-2064 54 19 it -PRON- PRP blog-dshr-org-2064 54 20 hard hard JJ blog-dshr-org-2064 54 21 for for IN blog-dshr-org-2064 54 22 even even RB blog-dshr-org-2064 54 23 a a DT blog-dshr-org-2064 54 24 very very RB blog-dshr-org-2064 54 25 large large JJ blog-dshr-org-2064 54 26 collusion collusion NN blog-dshr-org-2064 54 27 among among IN blog-dshr-org-2064 54 28 the the DT blog-dshr-org-2064 54 29 peers peer NNS blog-dshr-org-2064 54 30 to to TO blog-dshr-org-2064 54 31 modify modify VB blog-dshr-org-2064 54 32 the the DT blog-dshr-org-2064 54 33 consensus consensus NN blog-dshr-org-2064 54 34 of of IN blog-dshr-org-2064 54 35 the the DT blog-dshr-org-2064 54 36 non non JJ blog-dshr-org-2064 54 37 - - JJ blog-dshr-org-2064 54 38 colluding colluding JJ blog-dshr-org-2064 54 39 peers peer NNS blog-dshr-org-2064 54 40 without without IN blog-dshr-org-2064 54 41 detection detection NN blog-dshr-org-2064 54 42 . . . blog-dshr-org-2064 55 1 The the DT blog-dshr-org-2064 55 2 large large JJ blog-dshr-org-2064 55 3 surplus surplus NN blog-dshr-org-2064 55 4 of of IN blog-dshr-org-2064 55 5 replicas replica NNS blog-dshr-org-2064 55 6 allowed allow VBD blog-dshr-org-2064 55 7 each each DT blog-dshr-org-2064 55 8 peer peer NN blog-dshr-org-2064 55 9 to to TO blog-dshr-org-2064 55 10 involve involve VB blog-dshr-org-2064 55 11 a a DT blog-dshr-org-2064 55 12 random random JJ blog-dshr-org-2064 55 13 sample sample NN blog-dshr-org-2064 55 14 of of IN blog-dshr-org-2064 55 15 other other JJ blog-dshr-org-2064 55 16 peers peer NNS blog-dshr-org-2064 55 17 in in IN blog-dshr-org-2064 55 18 each each DT blog-dshr-org-2064 55 19 operation operation NN blog-dshr-org-2064 55 20 . . . blog-dshr-org-2064 56 1 Absent absent VB blog-dshr-org-2064 56 2 an an DT blog-dshr-org-2064 56 3 attacker attacker NN blog-dshr-org-2064 56 4 , , , blog-dshr-org-2064 56 5 the the DT blog-dshr-org-2064 56 6 result result NN blog-dshr-org-2064 56 7 of of IN blog-dshr-org-2064 56 8 each each DT blog-dshr-org-2064 56 9 operation operation NN blog-dshr-org-2064 56 10 would would MD blog-dshr-org-2064 56 11 be be VB blog-dshr-org-2064 56 12 landslide landslide NN blog-dshr-org-2064 56 13 agreement agreement NN blog-dshr-org-2064 56 14 or or CC blog-dshr-org-2064 56 15 landslide landslide NN blog-dshr-org-2064 56 16 disagreement disagreement NN blog-dshr-org-2064 56 17 . . . blog-dshr-org-2064 57 1 The the DT blog-dshr-org-2064 57 2 random random JJ blog-dshr-org-2064 57 3 sample sample NN blog-dshr-org-2064 57 4 of of IN blog-dshr-org-2064 57 5 peers peer NNS blog-dshr-org-2064 57 6 made make VBD blog-dshr-org-2064 57 7 it -PRON- PRP blog-dshr-org-2064 57 8 hard hard JJ blog-dshr-org-2064 57 9 for for IN blog-dshr-org-2064 57 10 an an DT blog-dshr-org-2064 57 11 attacker attacker NN blog-dshr-org-2064 57 12 to to TO blog-dshr-org-2064 57 13 ensure ensure VB blog-dshr-org-2064 57 14 that that IN blog-dshr-org-2064 57 15 all all DT blog-dshr-org-2064 57 16 operations operation NNS blog-dshr-org-2064 57 17 resulted result VBD blog-dshr-org-2064 57 18 in in IN blog-dshr-org-2064 57 19 landslides landslide NNS blog-dshr-org-2064 57 20 . . . blog-dshr-org-2064 58 1 Alas alas UH blog-dshr-org-2064 58 2 , , , blog-dshr-org-2064 58 3 this this DT blog-dshr-org-2064 58 4 technique technique NN blog-dshr-org-2064 58 5 has have VBZ blog-dshr-org-2064 58 6 proven prove VBN blog-dshr-org-2064 58 7 difficult difficult JJ blog-dshr-org-2064 58 8 to to TO blog-dshr-org-2064 58 9 apply apply VB blog-dshr-org-2064 58 10 in in IN blog-dshr-org-2064 58 11 other other JJ blog-dshr-org-2064 58 12 contexts contexts NN blog-dshr-org-2064 58 13 , , , blog-dshr-org-2064 58 14 which which WDT blog-dshr-org-2064 58 15 in in IN blog-dshr-org-2064 58 16 any any DT blog-dshr-org-2064 58 17 case case NN blog-dshr-org-2064 58 18 ( ( -LRB- blog-dshr-org-2064 58 19 except except IN blog-dshr-org-2064 58 20 for for IN blog-dshr-org-2064 58 21 cryotcurrencies cryotcurrencie NNS blog-dshr-org-2064 58 22 ) ) -RRB- blog-dshr-org-2064 58 23 find find VBP blog-dshr-org-2064 58 24 it -PRON- PRP blog-dshr-org-2064 58 25 difficult difficult JJ blog-dshr-org-2064 58 26 to to TO blog-dshr-org-2064 58 27 provide provide VB blog-dshr-org-2064 58 28 a a DT blog-dshr-org-2064 58 29 sufficient sufficient JJ blog-dshr-org-2064 58 30 surplus surplus NN blog-dshr-org-2064 58 31 of of IN blog-dshr-org-2064 58 32 replicas replicas NN blog-dshr-org-2064 58 33 . . . blog-dshr-org-2064 59 1 Szabo Szabo NNP blog-dshr-org-2064 59 2 Nick Nick NNP blog-dshr-org-2064 59 3 Szabo Szabo NNP blog-dshr-org-2064 59 4 was be VBD blog-dshr-org-2064 59 5 a a DT blog-dshr-org-2064 59 6 pioneer pioneer NN blog-dshr-org-2064 59 7 of of IN blog-dshr-org-2064 59 8 digital digital JJ blog-dshr-org-2064 59 9 currency currency NN blog-dshr-org-2064 59 10 , , , blog-dshr-org-2064 59 11 sometimes sometimes RB blog-dshr-org-2064 59 12 even even RB blog-dshr-org-2064 59 13 suspected suspect VBN blog-dshr-org-2064 59 14 of of IN blog-dshr-org-2064 59 15 being be VBG blog-dshr-org-2064 59 16 Satoshi Satoshi NNP blog-dshr-org-2064 59 17 Nakamoto Nakamoto NNP blog-dshr-org-2064 59 18 . . . blog-dshr-org-2064 60 1 His -PRON- PRP$ blog-dshr-org-2064 60 2 essay essay NN blog-dshr-org-2064 60 3 Money money NN blog-dshr-org-2064 60 4 , , , blog-dshr-org-2064 60 5 blockchains blockchain NNS blog-dshr-org-2064 60 6 , , , blog-dshr-org-2064 60 7 and and CC blog-dshr-org-2064 60 8 social social JJ blog-dshr-org-2064 60 9 scalability scalability NN blog-dshr-org-2064 60 10 starts start VBZ blog-dshr-org-2064 60 11 by by IN blog-dshr-org-2064 60 12 agreeing agree VBG blog-dshr-org-2064 60 13 with with IN blog-dshr-org-2064 60 14 Perlman Perlman NNP blog-dshr-org-2064 60 15 that that IN blog-dshr-org-2064 60 16 blockchains blockchain NNS blog-dshr-org-2064 60 17 are be VBP blog-dshr-org-2064 60 18 extremely extremely RB blog-dshr-org-2064 60 19 wasteful wasteful JJ blog-dshr-org-2064 60 20 of of IN blog-dshr-org-2064 60 21 resources resource NNS blog-dshr-org-2064 60 22 : : : blog-dshr-org-2064 60 23 Blockchains blockchain NNS blog-dshr-org-2064 60 24 are be VBP blog-dshr-org-2064 60 25 all all PDT blog-dshr-org-2064 60 26 the the DT blog-dshr-org-2064 60 27 rage rage NN blog-dshr-org-2064 60 28 . . . blog-dshr-org-2064 61 1 The the DT blog-dshr-org-2064 61 2 oldest old JJS blog-dshr-org-2064 61 3 and and CC blog-dshr-org-2064 61 4 biggest big JJS blog-dshr-org-2064 61 5 blockchain blockchain JJ blog-dshr-org-2064 61 6 of of IN blog-dshr-org-2064 61 7 them -PRON- PRP blog-dshr-org-2064 61 8 all all DT blog-dshr-org-2064 61 9 is be VBZ blog-dshr-org-2064 61 10 Bitcoin Bitcoin NNP blog-dshr-org-2064 61 11 , , , blog-dshr-org-2064 61 12 ... ... : blog-dshr-org-2064 61 13 Running run VBG blog-dshr-org-2064 61 14 non non JJ blog-dshr-org-2064 61 15 - - JJ blog-dshr-org-2064 61 16 stop stop VB blog-dshr-org-2064 61 17 for for IN blog-dshr-org-2064 61 18 eight eight CD blog-dshr-org-2064 61 19 years year NNS blog-dshr-org-2064 61 20 , , , blog-dshr-org-2064 61 21 with with IN blog-dshr-org-2064 61 22 almost almost RB blog-dshr-org-2064 61 23 no no DT blog-dshr-org-2064 61 24 financial financial JJ blog-dshr-org-2064 61 25 loss loss NN blog-dshr-org-2064 61 26 on on IN blog-dshr-org-2064 61 27 the the DT blog-dshr-org-2064 61 28 chain chain NN blog-dshr-org-2064 61 29 itself -PRON- PRP blog-dshr-org-2064 61 30 , , , blog-dshr-org-2064 61 31 it -PRON- PRP blog-dshr-org-2064 61 32 is be VBZ blog-dshr-org-2064 61 33 now now RB blog-dshr-org-2064 61 34 in in IN blog-dshr-org-2064 61 35 important important JJ blog-dshr-org-2064 61 36 ways way NNS blog-dshr-org-2064 61 37 the the DT blog-dshr-org-2064 61 38 most most RBS blog-dshr-org-2064 61 39 reliable reliable JJ blog-dshr-org-2064 61 40 and and CC blog-dshr-org-2064 61 41 secure secure JJ blog-dshr-org-2064 61 42 financial financial JJ blog-dshr-org-2064 61 43 network network NN blog-dshr-org-2064 61 44 in in IN blog-dshr-org-2064 61 45 the the DT blog-dshr-org-2064 61 46 world world NN blog-dshr-org-2064 61 47 . . . blog-dshr-org-2064 62 1 The the DT blog-dshr-org-2064 62 2 secret secret NN blog-dshr-org-2064 62 3 to to IN blog-dshr-org-2064 62 4 Bitcoin Bitcoin NNP blog-dshr-org-2064 62 5 ’s ’s POS blog-dshr-org-2064 62 6 success success NN blog-dshr-org-2064 62 7 is be VBZ blog-dshr-org-2064 62 8 certainly certainly RB blog-dshr-org-2064 62 9 not not RB blog-dshr-org-2064 62 10 its -PRON- PRP$ blog-dshr-org-2064 62 11 computational computational JJ blog-dshr-org-2064 62 12 efficiency efficiency NN blog-dshr-org-2064 62 13 or or CC blog-dshr-org-2064 62 14 its -PRON- PRP$ blog-dshr-org-2064 62 15 scalability scalability NN blog-dshr-org-2064 62 16 in in IN blog-dshr-org-2064 62 17 the the DT blog-dshr-org-2064 62 18 consumption consumption NN blog-dshr-org-2064 62 19 of of IN blog-dshr-org-2064 62 20 resources resource NNS blog-dshr-org-2064 62 21 . . . blog-dshr-org-2064 63 1 ... ... : blog-dshr-org-2064 63 2 Bitcoin Bitcoin NNP blog-dshr-org-2064 63 3 ’s ’s POS blog-dshr-org-2064 63 4 puzzle puzzle NN blog-dshr-org-2064 63 5 - - HYPH blog-dshr-org-2064 63 6 solving solve VBG blog-dshr-org-2064 63 7 hardware hardware NN blog-dshr-org-2064 63 8 probably probably RB blog-dshr-org-2064 63 9 consumes consume VBZ blog-dshr-org-2064 63 10 in in IN blog-dshr-org-2064 63 11 total total NN blog-dshr-org-2064 63 12 over over IN blog-dshr-org-2064 63 13 500 500 CD blog-dshr-org-2064 63 14 megawatts megawatt NNS blog-dshr-org-2064 63 15 of of IN blog-dshr-org-2064 63 16 electricity electricity NN blog-dshr-org-2064 63 17 . . . blog-dshr-org-2064 64 1 ... ... NFP blog-dshr-org-2064 64 2 Rather rather RB blog-dshr-org-2064 64 3 than than IN blog-dshr-org-2064 64 4 reduce reduce VB blog-dshr-org-2064 64 5 its -PRON- PRP$ blog-dshr-org-2064 64 6 protocol protocol NN blog-dshr-org-2064 64 7 messages message NNS blog-dshr-org-2064 64 8 to to TO blog-dshr-org-2064 64 9 be be VB blog-dshr-org-2064 64 10 as as RB blog-dshr-org-2064 64 11 few few JJ blog-dshr-org-2064 64 12 as as IN blog-dshr-org-2064 64 13 possible possible JJ blog-dshr-org-2064 64 14 , , , blog-dshr-org-2064 64 15 each each DT blog-dshr-org-2064 64 16 Bitcoin bitcoin NN blog-dshr-org-2064 64 17 - - HYPH blog-dshr-org-2064 64 18 running run VBG blog-dshr-org-2064 64 19 computer computer NN blog-dshr-org-2064 64 20 sprays spray VBZ blog-dshr-org-2064 64 21 the the DT blog-dshr-org-2064 64 22 Internet internet NN blog-dshr-org-2064 64 23 with with IN blog-dshr-org-2064 64 24 a a DT blog-dshr-org-2064 64 25 redundantly redundantly RB blog-dshr-org-2064 64 26 large large JJ blog-dshr-org-2064 64 27 number number NN blog-dshr-org-2064 64 28 of of IN blog-dshr-org-2064 64 29 “ " `` blog-dshr-org-2064 64 30 inventory inventory NN blog-dshr-org-2064 64 31 vector vector NN blog-dshr-org-2064 64 32 ” " '' blog-dshr-org-2064 64 33 packets packet NNS blog-dshr-org-2064 64 34 to to TO blog-dshr-org-2064 64 35 make make VB blog-dshr-org-2064 64 36 very very RB blog-dshr-org-2064 64 37 sure sure JJ blog-dshr-org-2064 64 38 that that IN blog-dshr-org-2064 64 39 all all DT blog-dshr-org-2064 64 40 messages message NNS blog-dshr-org-2064 64 41 get get VB blog-dshr-org-2064 64 42 accurately accurately RB blog-dshr-org-2064 64 43 through through IN blog-dshr-org-2064 64 44 to to IN blog-dshr-org-2064 64 45 as as RB blog-dshr-org-2064 64 46 many many JJ blog-dshr-org-2064 64 47 other other JJ blog-dshr-org-2064 64 48 Bitcoin Bitcoin NNP blog-dshr-org-2064 64 49 computers computer NNS blog-dshr-org-2064 64 50 as as IN blog-dshr-org-2064 64 51 possible possible JJ blog-dshr-org-2064 64 52 . . . blog-dshr-org-2064 65 1 As as IN blog-dshr-org-2064 65 2 a a DT blog-dshr-org-2064 65 3 result result NN blog-dshr-org-2064 65 4 , , , blog-dshr-org-2064 65 5 the the DT blog-dshr-org-2064 65 6 Bitcoin Bitcoin NNP blog-dshr-org-2064 65 7 blockchain blockchain NN blog-dshr-org-2064 65 8 can can MD blog-dshr-org-2064 65 9 not not RB blog-dshr-org-2064 65 10 process process VB blog-dshr-org-2064 65 11 as as IN blog-dshr-org-2064 65 12 many many JJ blog-dshr-org-2064 65 13 transactions transaction NNS blog-dshr-org-2064 65 14 per per IN blog-dshr-org-2064 65 15 second second NN blog-dshr-org-2064 65 16 as as IN blog-dshr-org-2064 65 17 a a DT blog-dshr-org-2064 65 18 traditional traditional JJ blog-dshr-org-2064 65 19 payment payment NN blog-dshr-org-2064 65 20 network network NN blog-dshr-org-2064 65 21 such such JJ blog-dshr-org-2064 65 22 as as IN blog-dshr-org-2064 65 23 PayPal PayPal NNP blog-dshr-org-2064 65 24 or or CC blog-dshr-org-2064 65 25 Visa Visa NNP blog-dshr-org-2064 65 26 . . . blog-dshr-org-2064 66 1 Szabo Szabo NNP blog-dshr-org-2064 66 2 then then RB blog-dshr-org-2064 66 3 provides provide VBZ blog-dshr-org-2064 66 4 a a DT blog-dshr-org-2064 66 5 different different JJ blog-dshr-org-2064 66 6 answer answer NN blog-dshr-org-2064 66 7 than than IN blog-dshr-org-2064 66 8 Perlman Perlman NNP blog-dshr-org-2064 66 9 's 's POS blog-dshr-org-2064 66 10 to to IN blog-dshr-org-2064 66 11 the the DT blog-dshr-org-2064 66 12 question question NN blog-dshr-org-2064 66 13 " " `` blog-dshr-org-2064 66 14 what what WP blog-dshr-org-2064 66 15 does do VBZ blog-dshr-org-2064 66 16 Bitcoin Bitcoin NNP blog-dshr-org-2064 66 17 get get VB blog-dshr-org-2064 66 18 in in IN blog-dshr-org-2064 66 19 return return NN blog-dshr-org-2064 66 20 for for IN blog-dshr-org-2064 66 21 this this DT blog-dshr-org-2064 66 22 profligate profligate JJ blog-dshr-org-2064 66 23 expenditure expenditure NN blog-dshr-org-2064 66 24 of of IN blog-dshr-org-2064 66 25 resources resource NNS blog-dshr-org-2064 66 26 ? ? . blog-dshr-org-2064 66 27 " " '' blog-dshr-org-2064 67 1 the the DT blog-dshr-org-2064 67 2 secret secret NN blog-dshr-org-2064 67 3 to to IN blog-dshr-org-2064 67 4 Bitcoin Bitcoin NNP blog-dshr-org-2064 67 5 ’s ’s POS blog-dshr-org-2064 67 6 success success NN blog-dshr-org-2064 67 7 is be VBZ blog-dshr-org-2064 67 8 that that IN blog-dshr-org-2064 67 9 its -PRON- PRP$ blog-dshr-org-2064 67 10 prolific prolific JJ blog-dshr-org-2064 67 11 resource resource NN blog-dshr-org-2064 67 12 consumption consumption NN blog-dshr-org-2064 67 13 and and CC blog-dshr-org-2064 67 14 poor poor JJ blog-dshr-org-2064 67 15 computational computational JJ blog-dshr-org-2064 67 16 scalability scalability NN blog-dshr-org-2064 67 17 is be VBZ blog-dshr-org-2064 67 18 buying buy VBG blog-dshr-org-2064 67 19 something something NN blog-dshr-org-2064 67 20 even even RB blog-dshr-org-2064 67 21 more more RBR blog-dshr-org-2064 67 22 valuable valuable JJ blog-dshr-org-2064 67 23 : : : blog-dshr-org-2064 67 24 social social JJ blog-dshr-org-2064 67 25 scalability scalability NN blog-dshr-org-2064 67 26 . . . blog-dshr-org-2064 68 1 ... ... : blog-dshr-org-2064 68 2 Social social JJ blog-dshr-org-2064 68 3 scalability scalability NN blog-dshr-org-2064 68 4 is be VBZ blog-dshr-org-2064 68 5 about about IN blog-dshr-org-2064 68 6 the the DT blog-dshr-org-2064 68 7 ways way NNS blog-dshr-org-2064 68 8 and and CC blog-dshr-org-2064 68 9 extents extent NNS blog-dshr-org-2064 68 10 to to TO blog-dshr-org-2064 68 11 which which WDT blog-dshr-org-2064 68 12 participants participant NNS blog-dshr-org-2064 68 13 can can MD blog-dshr-org-2064 68 14 think think VB blog-dshr-org-2064 68 15 about about IN blog-dshr-org-2064 68 16 and and CC blog-dshr-org-2064 68 17 respond respond VB blog-dshr-org-2064 68 18 to to IN blog-dshr-org-2064 68 19 institutions institution NNS blog-dshr-org-2064 68 20 and and CC blog-dshr-org-2064 68 21 fellow fellow NN blog-dshr-org-2064 68 22 participants participant NNS blog-dshr-org-2064 68 23 as as IN blog-dshr-org-2064 68 24 the the DT blog-dshr-org-2064 68 25 variety variety NN blog-dshr-org-2064 68 26 and and CC blog-dshr-org-2064 68 27 numbers number NNS blog-dshr-org-2064 68 28 of of IN blog-dshr-org-2064 68 29 participants participant NNS blog-dshr-org-2064 68 30 in in IN blog-dshr-org-2064 68 31 those those DT blog-dshr-org-2064 68 32 institutions institution NNS blog-dshr-org-2064 68 33 or or CC blog-dshr-org-2064 68 34 relationships relationship NNS blog-dshr-org-2064 68 35 grow grow VBP blog-dshr-org-2064 68 36 . . . blog-dshr-org-2064 69 1 It -PRON- PRP blog-dshr-org-2064 69 2 's be VBZ blog-dshr-org-2064 69 3 about about IN blog-dshr-org-2064 69 4 human human JJ blog-dshr-org-2064 69 5 limitations limitation NNS blog-dshr-org-2064 69 6 , , , blog-dshr-org-2064 69 7 not not RB blog-dshr-org-2064 69 8 about about IN blog-dshr-org-2064 69 9 technological technological JJ blog-dshr-org-2064 69 10 limitations limitation NNS blog-dshr-org-2064 69 11 or or CC blog-dshr-org-2064 69 12 physical physical JJ blog-dshr-org-2064 69 13 resource resource NN blog-dshr-org-2064 69 14 constraints constraint NNS blog-dshr-org-2064 69 15 . . . blog-dshr-org-2064 70 1 He -PRON- PRP blog-dshr-org-2064 70 2 measures measure VBZ blog-dshr-org-2064 70 3 social social JJ blog-dshr-org-2064 70 4 scalability scalability NN blog-dshr-org-2064 70 5 thus thus RB blog-dshr-org-2064 70 6 : : : blog-dshr-org-2064 70 7 One one CD blog-dshr-org-2064 70 8 way way NN blog-dshr-org-2064 70 9 to to TO blog-dshr-org-2064 70 10 estimate estimate VB blog-dshr-org-2064 70 11 the the DT blog-dshr-org-2064 70 12 social social JJ blog-dshr-org-2064 70 13 scalability scalability NN blog-dshr-org-2064 70 14 of of IN blog-dshr-org-2064 70 15 an an DT blog-dshr-org-2064 70 16 institutional institutional JJ blog-dshr-org-2064 70 17 technology technology NN blog-dshr-org-2064 70 18 is be VBZ blog-dshr-org-2064 70 19 by by IN blog-dshr-org-2064 70 20 the the DT blog-dshr-org-2064 70 21 number number NN blog-dshr-org-2064 70 22 of of IN blog-dshr-org-2064 70 23 people people NNS blog-dshr-org-2064 70 24 who who WP blog-dshr-org-2064 70 25 can can MD blog-dshr-org-2064 70 26 beneficially beneficially RB blog-dshr-org-2064 70 27 participate participate VB blog-dshr-org-2064 70 28 in in IN blog-dshr-org-2064 70 29 the the DT blog-dshr-org-2064 70 30 institution institution NN blog-dshr-org-2064 70 31 . . . blog-dshr-org-2064 71 1 ... ... NFP blog-dshr-org-2064 71 2 blockchains blockchain NNS blog-dshr-org-2064 71 3 , , , blog-dshr-org-2064 71 4 and and CC blog-dshr-org-2064 71 5 in in IN blog-dshr-org-2064 71 6 particular particular JJ blog-dshr-org-2064 71 7 public public JJ blog-dshr-org-2064 71 8 blockchains blockchain NNS blog-dshr-org-2064 71 9 that that WDT blog-dshr-org-2064 71 10 implement implement VBP blog-dshr-org-2064 71 11 cryptocurrencies cryptocurrencie NNS blog-dshr-org-2064 71 12 , , , blog-dshr-org-2064 71 13 increase increase VB blog-dshr-org-2064 71 14 social social JJ blog-dshr-org-2064 71 15 scalability scalability NN blog-dshr-org-2064 71 16 , , , blog-dshr-org-2064 71 17 even even RB blog-dshr-org-2064 71 18 at at IN blog-dshr-org-2064 71 19 a a DT blog-dshr-org-2064 71 20 dreadful dreadful JJ blog-dshr-org-2064 71 21 reduction reduction NN blog-dshr-org-2064 71 22 in in IN blog-dshr-org-2064 71 23 computational computational JJ blog-dshr-org-2064 71 24 efficiency efficiency NN blog-dshr-org-2064 71 25 and and CC blog-dshr-org-2064 71 26 scalability scalability NN blog-dshr-org-2064 71 27 . . . blog-dshr-org-2064 72 1 People People NNS blog-dshr-org-2064 72 2 participate participate VBP blog-dshr-org-2064 72 3 in in IN blog-dshr-org-2064 72 4 cryptocurrencies cryptocurrencie NNS blog-dshr-org-2064 72 5 in in IN blog-dshr-org-2064 72 6 three three CD blog-dshr-org-2064 72 7 ways way NNS blog-dshr-org-2064 72 8 , , , blog-dshr-org-2064 72 9 by by IN blog-dshr-org-2064 72 10 mining mining NN blog-dshr-org-2064 72 11 , , , blog-dshr-org-2064 72 12 transacting transact VBG blog-dshr-org-2064 72 13 , , , blog-dshr-org-2064 72 14 and and CC blog-dshr-org-2064 72 15 HODL HODL NNP blog-dshr-org-2064 72 16 - - HYPH blog-dshr-org-2064 72 17 ing ing NNP blog-dshr-org-2064 72 18 . . . blog-dshr-org-2064 73 1 In in IN blog-dshr-org-2064 73 2 practice practice NN blog-dshr-org-2064 73 3 most most JJS blog-dshr-org-2064 73 4 miners miner NNS blog-dshr-org-2064 73 5 simply simply RB blog-dshr-org-2064 73 6 passively passively RB blog-dshr-org-2064 73 7 contribute contribute VB blog-dshr-org-2064 73 8 resources resource NNS blog-dshr-org-2064 73 9 to to IN blog-dshr-org-2064 73 10 a a DT blog-dshr-org-2064 73 11 few few JJ blog-dshr-org-2064 73 12 large large JJ blog-dshr-org-2064 73 13 mining mining NN blog-dshr-org-2064 73 14 pools pool NNS blog-dshr-org-2064 73 15 in in IN blog-dshr-org-2064 73 16 return return NN blog-dshr-org-2064 73 17 for for IN blog-dshr-org-2064 73 18 a a DT blog-dshr-org-2064 73 19 consistent consistent JJ blog-dshr-org-2064 73 20 cash cash NN blog-dshr-org-2064 73 21 flow flow NN blog-dshr-org-2064 73 22 . . . blog-dshr-org-2064 74 1 Chinese chinese JJ blog-dshr-org-2064 74 2 day day NN blog-dshr-org-2064 74 3 - - HYPH blog-dshr-org-2064 74 4 traders trader NNS blog-dshr-org-2064 74 5 generate generate VBP blog-dshr-org-2064 74 6 the the DT blog-dshr-org-2064 74 7 vast vast JJ blog-dshr-org-2064 74 8 majority majority NN blog-dshr-org-2064 74 9 of of IN blog-dshr-org-2064 74 10 Bitcoin Bitcoin NNP blog-dshr-org-2064 74 11 transactions transaction NNS blog-dshr-org-2064 74 12 . . . blog-dshr-org-2064 75 1 40 40 CD blog-dshr-org-2064 75 2 % % NN blog-dshr-org-2064 75 3 of of IN blog-dshr-org-2064 75 4 Bitcoin Bitcoin NNP blog-dshr-org-2064 75 5 are be VBP blog-dshr-org-2064 75 6 HODL HODL NNP blog-dshr-org-2064 75 7 - - HYPH blog-dshr-org-2064 75 8 ed ed NNP blog-dshr-org-2064 75 9 by by IN blog-dshr-org-2064 75 10 a a DT blog-dshr-org-2064 75 11 small small JJ blog-dshr-org-2064 75 12 number number NN blog-dshr-org-2064 75 13 of of IN blog-dshr-org-2064 75 14 early early JJ blog-dshr-org-2064 75 15 adopters adopter NNS blog-dshr-org-2064 75 16 . . . blog-dshr-org-2064 76 1 None none NN blog-dshr-org-2064 76 2 of of IN blog-dshr-org-2064 76 3 these these DT blog-dshr-org-2064 76 4 are be VBP blog-dshr-org-2064 76 5 really really RB blog-dshr-org-2064 76 6 great great JJ blog-dshr-org-2064 76 7 social social JJ blog-dshr-org-2064 76 8 scalability scalability NN blog-dshr-org-2064 76 9 . . . blog-dshr-org-2064 77 1 Bitcoin Bitcoin NNP blog-dshr-org-2064 77 2 is be VBZ blog-dshr-org-2064 77 3 a a DT blog-dshr-org-2064 77 4 scheme scheme NN blog-dshr-org-2064 77 5 to to TO blog-dshr-org-2064 77 6 transfer transfer VB blog-dshr-org-2064 77 7 money money NN blog-dshr-org-2064 77 8 from from IN blog-dshr-org-2064 77 9 many many JJ blog-dshr-org-2064 77 10 later later RB blog-dshr-org-2064 77 11 to to IN blog-dshr-org-2064 77 12 a a DT blog-dshr-org-2064 77 13 few few JJ blog-dshr-org-2064 77 14 earlier early JJR blog-dshr-org-2064 77 15 adopters adopter NNS blog-dshr-org-2064 77 16 : : : blog-dshr-org-2064 77 17 Bitcoin Bitcoin NNP blog-dshr-org-2064 77 18 was be VBD blog-dshr-org-2064 77 19 substantially substantially RB blog-dshr-org-2064 77 20 mined mine VBN blog-dshr-org-2064 77 21 early early RB blog-dshr-org-2064 77 22 on on RB blog-dshr-org-2064 77 23 - - HYPH blog-dshr-org-2064 77 24 early early JJ blog-dshr-org-2064 77 25 adopters adopter NNS blog-dshr-org-2064 77 26 have have VBP blog-dshr-org-2064 77 27 most most JJS blog-dshr-org-2064 77 28 of of IN blog-dshr-org-2064 77 29 the the DT blog-dshr-org-2064 77 30 coins coin NNS blog-dshr-org-2064 77 31 . . . blog-dshr-org-2064 78 1 The the DT blog-dshr-org-2064 78 2 design design NN blog-dshr-org-2064 78 3 was be VBD blog-dshr-org-2064 78 4 such such JJ blog-dshr-org-2064 78 5 that that IN blog-dshr-org-2064 78 6 early early JJ blog-dshr-org-2064 78 7 users user NNS blog-dshr-org-2064 78 8 would would MD blog-dshr-org-2064 78 9 get get VB blog-dshr-org-2064 78 10 vastly vastly RB blog-dshr-org-2064 78 11 better well JJR blog-dshr-org-2064 78 12 rewards reward NNS blog-dshr-org-2064 78 13 than than IN blog-dshr-org-2064 78 14 later later JJ blog-dshr-org-2064 78 15 users user NNS blog-dshr-org-2064 78 16 for for IN blog-dshr-org-2064 78 17 the the DT blog-dshr-org-2064 78 18 same same JJ blog-dshr-org-2064 78 19 effort effort NN blog-dshr-org-2064 78 20 . . . blog-dshr-org-2064 79 1 Cashing cash VBG blog-dshr-org-2064 79 2 in in IN blog-dshr-org-2064 79 3 these these DT blog-dshr-org-2064 79 4 early early JJ blog-dshr-org-2064 79 5 coins coin NNS blog-dshr-org-2064 79 6 involves involve VBZ blog-dshr-org-2064 79 7 pumping pump VBG blog-dshr-org-2064 79 8 up up RP blog-dshr-org-2064 79 9 the the DT blog-dshr-org-2064 79 10 price price NN blog-dshr-org-2064 79 11 , , , blog-dshr-org-2064 79 12 then then RB blog-dshr-org-2064 79 13 selling sell VBG blog-dshr-org-2064 79 14 to to IN blog-dshr-org-2064 79 15 later later JJ blog-dshr-org-2064 79 16 adopters adopter NNS blog-dshr-org-2064 79 17 , , , blog-dshr-org-2064 79 18 particularly particularly RB blog-dshr-org-2064 79 19 in in IN blog-dshr-org-2064 79 20 the the DT blog-dshr-org-2064 79 21 bubbles bubble NNS blog-dshr-org-2064 79 22 . . . blog-dshr-org-2064 80 1 Thus thus RB blog-dshr-org-2064 80 2 Bitcoin Bitcoin NNP blog-dshr-org-2064 80 3 was be VBD blog-dshr-org-2064 80 4 not not RB blog-dshr-org-2064 80 5 a a DT blog-dshr-org-2064 80 6 Ponzi Ponzi NNP blog-dshr-org-2064 80 7 or or CC blog-dshr-org-2064 80 8 pyramid pyramid JJ blog-dshr-org-2064 80 9 scheme scheme NN blog-dshr-org-2064 80 10 , , , blog-dshr-org-2064 80 11 but but CC blog-dshr-org-2064 80 12 a a DT blog-dshr-org-2064 80 13 pump pump VB blog-dshr-org-2064 80 14 - - HYPH blog-dshr-org-2064 80 15 and and CC blog-dshr-org-2064 80 16 - - HYPH blog-dshr-org-2064 80 17 dump dump NN blog-dshr-org-2064 80 18 . . . blog-dshr-org-2064 81 1 Anyone anyone NN blog-dshr-org-2064 81 2 who who WP blog-dshr-org-2064 81 3 bought buy VBD blog-dshr-org-2064 81 4 in in RB blog-dshr-org-2064 81 5 after after IN blog-dshr-org-2064 81 6 the the DT blog-dshr-org-2064 81 7 earliest early JJS blog-dshr-org-2064 81 8 days day NNS blog-dshr-org-2064 81 9 is be VBZ blog-dshr-org-2064 81 10 functionally functionally RB blog-dshr-org-2064 81 11 the the DT blog-dshr-org-2064 81 12 sucker sucker NN blog-dshr-org-2064 81 13 in in IN blog-dshr-org-2064 81 14 the the DT blog-dshr-org-2064 81 15 relationship relationship NN blog-dshr-org-2064 81 16 . . . blog-dshr-org-2064 82 1 Szabo Szabo NNP blog-dshr-org-2064 82 2 goes go VBZ blog-dshr-org-2064 82 3 on on RP blog-dshr-org-2064 82 4 to to TO blog-dshr-org-2064 82 5 discuss discuss VB blog-dshr-org-2064 82 6 the the DT blog-dshr-org-2064 82 7 desirability desirability NN blog-dshr-org-2064 82 8 of of IN blog-dshr-org-2064 82 9 trust trust NN blog-dshr-org-2064 82 10 minimization minimization NN blog-dshr-org-2064 82 11 and and CC blog-dshr-org-2064 82 12 the the DT blog-dshr-org-2064 82 13 impossibility impossibility NN blog-dshr-org-2064 82 14 of of IN blog-dshr-org-2064 82 15 eliminating eliminate VBG blog-dshr-org-2064 82 16 the the DT blog-dshr-org-2064 82 17 need need NN blog-dshr-org-2064 82 18 for for IN blog-dshr-org-2064 82 19 trust trust NN blog-dshr-org-2064 82 20 : : : blog-dshr-org-2064 82 21 Trust trust NN blog-dshr-org-2064 82 22 minimization minimization NN blog-dshr-org-2064 82 23 is be VBZ blog-dshr-org-2064 82 24 reducing reduce VBG blog-dshr-org-2064 82 25 the the DT blog-dshr-org-2064 82 26 vulnerability vulnerability NN blog-dshr-org-2064 82 27 of of IN blog-dshr-org-2064 82 28 participants participant NNS blog-dshr-org-2064 82 29 to to IN blog-dshr-org-2064 82 30 each each DT blog-dshr-org-2064 82 31 other other JJ blog-dshr-org-2064 82 32 ’s ’s , blog-dshr-org-2064 82 33 and and CC blog-dshr-org-2064 82 34 to to IN blog-dshr-org-2064 82 35 outsiders outsider NNS blog-dshr-org-2064 82 36 ’ ' '' blog-dshr-org-2064 82 37 and and CC blog-dshr-org-2064 82 38 intermediaries intermediary NNS blog-dshr-org-2064 82 39 ’ ’ POS blog-dshr-org-2064 82 40 potential potential NN blog-dshr-org-2064 82 41 for for IN blog-dshr-org-2064 82 42 harmful harmful JJ blog-dshr-org-2064 82 43 behavior behavior NN blog-dshr-org-2064 82 44 . . . blog-dshr-org-2064 83 1 ... ... NFP blog-dshr-org-2064 84 1 In in IN blog-dshr-org-2064 84 2 most most JJS blog-dshr-org-2064 84 3 cases case NNS blog-dshr-org-2064 84 4 an an DT blog-dshr-org-2064 84 5 often often RB blog-dshr-org-2064 84 6 trusted trust VBN blog-dshr-org-2064 84 7 and and CC blog-dshr-org-2064 84 8 sufficiently sufficiently RB blog-dshr-org-2064 84 9 trustworthy trustworthy JJ blog-dshr-org-2064 84 10 institution institution NN blog-dshr-org-2064 84 11 ( ( -LRB- blog-dshr-org-2064 84 12 such such JJ blog-dshr-org-2064 84 13 as as IN blog-dshr-org-2064 84 14 a a DT blog-dshr-org-2064 84 15 market market NN blog-dshr-org-2064 84 16 ) ) -RRB- blog-dshr-org-2064 84 17 depends depend VBZ blog-dshr-org-2064 84 18 on on IN blog-dshr-org-2064 84 19 its -PRON- PRP$ blog-dshr-org-2064 84 20 participants participant NNS blog-dshr-org-2064 84 21 trusting trust VBG blog-dshr-org-2064 84 22 , , , blog-dshr-org-2064 84 23 usually usually RB blog-dshr-org-2064 84 24 implicitly implicitly RB blog-dshr-org-2064 84 25 , , , blog-dshr-org-2064 84 26 another another DT blog-dshr-org-2064 84 27 sufficiently sufficiently RB blog-dshr-org-2064 84 28 trustworthy trustworthy JJ blog-dshr-org-2064 84 29 institution institution NN blog-dshr-org-2064 84 30 ( ( -LRB- blog-dshr-org-2064 84 31 such such JJ blog-dshr-org-2064 84 32 as as IN blog-dshr-org-2064 84 33 contract contract NN blog-dshr-org-2064 84 34 law law NN blog-dshr-org-2064 84 35 ) ) -RRB- blog-dshr-org-2064 84 36 . . . blog-dshr-org-2064 85 1 ... ... : blog-dshr-org-2064 85 2 An an DT blog-dshr-org-2064 85 3 innovation innovation NN blog-dshr-org-2064 85 4 can can MD blog-dshr-org-2064 85 5 only only RB blog-dshr-org-2064 85 6 partially partially RB blog-dshr-org-2064 85 7 take take VB blog-dshr-org-2064 85 8 away away RB blog-dshr-org-2064 85 9 some some DT blog-dshr-org-2064 85 10 kinds kind NNS blog-dshr-org-2064 85 11 of of IN blog-dshr-org-2064 85 12 vulnerability vulnerability NN blog-dshr-org-2064 85 13 , , , blog-dshr-org-2064 85 14 i.e. i.e. FW blog-dshr-org-2064 86 1 reduce reduce VB blog-dshr-org-2064 86 2 the the DT blog-dshr-org-2064 86 3 need need NN blog-dshr-org-2064 86 4 for for IN blog-dshr-org-2064 86 5 or or CC blog-dshr-org-2064 86 6 risk risk NN blog-dshr-org-2064 86 7 of of IN blog-dshr-org-2064 86 8 trust trust NN blog-dshr-org-2064 86 9 in in IN blog-dshr-org-2064 86 10 other other JJ blog-dshr-org-2064 86 11 people people NNS blog-dshr-org-2064 86 12 . . . blog-dshr-org-2064 87 1 There there EX blog-dshr-org-2064 87 2 is be VBZ blog-dshr-org-2064 87 3 no no DT blog-dshr-org-2064 87 4 such such JJ blog-dshr-org-2064 87 5 thing thing NN blog-dshr-org-2064 87 6 as as IN blog-dshr-org-2064 87 7 a a DT blog-dshr-org-2064 87 8 fully fully RB blog-dshr-org-2064 87 9 trustless trustless JJ blog-dshr-org-2064 87 10 institution institution NN blog-dshr-org-2064 87 11 or or CC blog-dshr-org-2064 87 12 technology technology NN blog-dshr-org-2064 87 13 . . . blog-dshr-org-2064 88 1 ... ... NFP blog-dshr-org-2064 89 1 The the DT blog-dshr-org-2064 89 2 historically historically RB blog-dshr-org-2064 89 3 recent recent JJ blog-dshr-org-2064 89 4 breakthroughs breakthrough NNS blog-dshr-org-2064 89 5 of of IN blog-dshr-org-2064 89 6 computer computer NN blog-dshr-org-2064 89 7 science science NN blog-dshr-org-2064 89 8 can can MD blog-dshr-org-2064 89 9 reduce reduce VB blog-dshr-org-2064 89 10 vulnerabilities vulnerability NNS blog-dshr-org-2064 89 11 , , , blog-dshr-org-2064 89 12 often often RB blog-dshr-org-2064 89 13 dramatically dramatically RB blog-dshr-org-2064 89 14 so so RB blog-dshr-org-2064 89 15 , , , blog-dshr-org-2064 89 16 but but CC blog-dshr-org-2064 89 17 they -PRON- PRP blog-dshr-org-2064 89 18 are be VBP blog-dshr-org-2064 89 19 far far RB blog-dshr-org-2064 89 20 from from IN blog-dshr-org-2064 89 21 eliminating eliminate VBG blog-dshr-org-2064 89 22 all all DT blog-dshr-org-2064 89 23 kinds kind NNS blog-dshr-org-2064 89 24 of of IN blog-dshr-org-2064 89 25 vulnerabilities vulnerability NNS blog-dshr-org-2064 89 26 to to IN blog-dshr-org-2064 89 27 the the DT blog-dshr-org-2064 89 28 harmful harmful JJ blog-dshr-org-2064 89 29 behavior behavior NN blog-dshr-org-2064 89 30 of of IN blog-dshr-org-2064 89 31 any any DT blog-dshr-org-2064 89 32 potential potential JJ blog-dshr-org-2064 89 33 attacker attacker NN blog-dshr-org-2064 89 34 . . . blog-dshr-org-2064 90 1 Szabo Szabo NNP blog-dshr-org-2064 90 2 plausibly plausibly RB blog-dshr-org-2064 90 3 argues argue VBZ blog-dshr-org-2064 90 4 that that IN blog-dshr-org-2064 90 5 the the DT blog-dshr-org-2064 90 6 difference difference NN blog-dshr-org-2064 90 7 between between IN blog-dshr-org-2064 90 8 conventional conventional JJ blog-dshr-org-2064 90 9 Internet internet NN blog-dshr-org-2064 90 10 services service NNS blog-dshr-org-2064 90 11 and and CC blog-dshr-org-2064 90 12 blockchains blockchain NNS blog-dshr-org-2064 90 13 is be VBZ blog-dshr-org-2064 90 14 that that IN blog-dshr-org-2064 90 15 between between IN blog-dshr-org-2064 90 16 matchmaking matchmaking NN blog-dshr-org-2064 90 17 and and CC blog-dshr-org-2064 90 18 trust trust NN blog-dshr-org-2064 90 19 - - HYPH blog-dshr-org-2064 90 20 minimization minimization NN blog-dshr-org-2064 90 21 : : : blog-dshr-org-2064 90 22 Matchmaking matchmaking NN blog-dshr-org-2064 90 23 is be VBZ blog-dshr-org-2064 90 24 facilitating facilitate VBG blog-dshr-org-2064 90 25 the the DT blog-dshr-org-2064 90 26 mutual mutual JJ blog-dshr-org-2064 90 27 discovery discovery NN blog-dshr-org-2064 90 28 of of IN blog-dshr-org-2064 90 29 mutually mutually RB blog-dshr-org-2064 90 30 beneficial beneficial JJ blog-dshr-org-2064 90 31 participants participant NNS blog-dshr-org-2064 90 32 . . . blog-dshr-org-2064 91 1 Matchmaking matchmaking NN blog-dshr-org-2064 91 2 is be VBZ blog-dshr-org-2064 91 3 probably probably RB blog-dshr-org-2064 91 4 the the DT blog-dshr-org-2064 91 5 kind kind NN blog-dshr-org-2064 91 6 of of IN blog-dshr-org-2064 91 7 social social JJ blog-dshr-org-2064 91 8 scalability scalability NN blog-dshr-org-2064 91 9 at at IN blog-dshr-org-2064 91 10 which which WDT blog-dshr-org-2064 91 11 the the DT blog-dshr-org-2064 91 12 Internet internet NN blog-dshr-org-2064 91 13 has have VBZ blog-dshr-org-2064 91 14 most most RBS blog-dshr-org-2064 91 15 excelled excel VBN blog-dshr-org-2064 91 16 . . . blog-dshr-org-2064 92 1 ... ... NFP blog-dshr-org-2064 93 1 Whereas whereas IN blog-dshr-org-2064 93 2 the the DT blog-dshr-org-2064 93 3 main main JJ blog-dshr-org-2064 93 4 social social JJ blog-dshr-org-2064 93 5 scalability scalability NN blog-dshr-org-2064 93 6 benefit benefit NN blog-dshr-org-2064 93 7 of of IN blog-dshr-org-2064 93 8 the the DT blog-dshr-org-2064 93 9 Internet internet NN blog-dshr-org-2064 93 10 has have VBZ blog-dshr-org-2064 93 11 been be VBN blog-dshr-org-2064 93 12 matchmaking matchmake VBG blog-dshr-org-2064 93 13 , , , blog-dshr-org-2064 93 14 the the DT blog-dshr-org-2064 93 15 predominant predominant JJ blog-dshr-org-2064 93 16 direct direct JJ blog-dshr-org-2064 93 17 social social JJ blog-dshr-org-2064 93 18 scalability scalability NN blog-dshr-org-2064 93 19 benefit benefit NN blog-dshr-org-2064 93 20 of of IN blog-dshr-org-2064 93 21 blockchains blockchain NNS blog-dshr-org-2064 93 22 is be VBZ blog-dshr-org-2064 93 23 trust trust NN blog-dshr-org-2064 93 24 minimization minimization NN blog-dshr-org-2064 93 25 . . . blog-dshr-org-2064 94 1 ... ... NFP blog-dshr-org-2064 94 2 Trust trust VB blog-dshr-org-2064 94 3 in in IN blog-dshr-org-2064 94 4 the the DT blog-dshr-org-2064 94 5 secret secret JJ blog-dshr-org-2064 94 6 and and CC blog-dshr-org-2064 94 7 arbitrarily arbitrarily RB blog-dshr-org-2064 94 8 mutable mutable JJ blog-dshr-org-2064 94 9 activities activity NNS blog-dshr-org-2064 94 10 of of IN blog-dshr-org-2064 94 11 a a DT blog-dshr-org-2064 94 12 private private JJ blog-dshr-org-2064 94 13 computation computation NN blog-dshr-org-2064 94 14 can can MD blog-dshr-org-2064 94 15 be be VB blog-dshr-org-2064 94 16 replaced replace VBN blog-dshr-org-2064 94 17 by by IN blog-dshr-org-2064 94 18 verifiable verifiable JJ blog-dshr-org-2064 94 19 confidence confidence NN blog-dshr-org-2064 94 20 in in IN blog-dshr-org-2064 94 21 the the DT blog-dshr-org-2064 94 22 behavior behavior NN blog-dshr-org-2064 94 23 of of IN blog-dshr-org-2064 94 24 a a DT blog-dshr-org-2064 94 25 generally generally RB blog-dshr-org-2064 94 26 immutable immutable JJ blog-dshr-org-2064 94 27 public public JJ blog-dshr-org-2064 94 28 computation computation NN blog-dshr-org-2064 94 29 . . . blog-dshr-org-2064 95 1 This this DT blog-dshr-org-2064 95 2 essay essay NN blog-dshr-org-2064 95 3 will will MD blog-dshr-org-2064 95 4 focus focus VB blog-dshr-org-2064 95 5 on on IN blog-dshr-org-2064 95 6 such such JJ blog-dshr-org-2064 95 7 vulnerability vulnerability NN blog-dshr-org-2064 95 8 reduction reduction NN blog-dshr-org-2064 95 9 and and CC blog-dshr-org-2064 95 10 its -PRON- PRP$ blog-dshr-org-2064 95 11 benefit benefit NN blog-dshr-org-2064 95 12 in in IN blog-dshr-org-2064 95 13 facilitating facilitate VBG blog-dshr-org-2064 95 14 a a DT blog-dshr-org-2064 95 15 standard standard JJ blog-dshr-org-2064 95 16 performance performance NN blog-dshr-org-2064 95 17 beneficial beneficial JJ blog-dshr-org-2064 95 18 to to IN blog-dshr-org-2064 95 19 a a DT blog-dshr-org-2064 95 20 wide wide JJ blog-dshr-org-2064 95 21 variety variety NN blog-dshr-org-2064 95 22 of of IN blog-dshr-org-2064 95 23 potential potential JJ blog-dshr-org-2064 95 24 counterparties counterpartie NNS blog-dshr-org-2064 95 25 , , , blog-dshr-org-2064 95 26 namely namely RB blog-dshr-org-2064 95 27 trust trust VB blog-dshr-org-2064 95 28 - - HYPH blog-dshr-org-2064 95 29 minimized minimize VBN blog-dshr-org-2064 95 30 money money NN blog-dshr-org-2064 95 31 . . . blog-dshr-org-2064 96 1 Szabo Szabo NNP blog-dshr-org-2064 96 2 then then RB blog-dshr-org-2064 96 3 describes describe VBZ blog-dshr-org-2064 96 4 his -PRON- PRP$ blog-dshr-org-2064 96 5 vision vision NN blog-dshr-org-2064 96 6 of of IN blog-dshr-org-2064 96 7 " " `` blog-dshr-org-2064 96 8 trust trust NN blog-dshr-org-2064 96 9 - - HYPH blog-dshr-org-2064 96 10 minimized minimize VBN blog-dshr-org-2064 96 11 money money NN blog-dshr-org-2064 96 12 " " '' blog-dshr-org-2064 96 13 and and CC blog-dshr-org-2064 96 14 its -PRON- PRP$ blog-dshr-org-2064 96 15 advantages advantage NNS blog-dshr-org-2064 96 16 thus thus RB blog-dshr-org-2064 96 17 : : : blog-dshr-org-2064 96 18 A a DT blog-dshr-org-2064 96 19 new new JJ blog-dshr-org-2064 96 20 centralized centralized JJ blog-dshr-org-2064 96 21 financial financial JJ blog-dshr-org-2064 96 22 entity entity NN blog-dshr-org-2064 96 23 , , , blog-dshr-org-2064 96 24 a a DT blog-dshr-org-2064 96 25 trusted trust VBN blog-dshr-org-2064 96 26 third third JJ blog-dshr-org-2064 96 27 party party NN blog-dshr-org-2064 96 28 without without IN blog-dshr-org-2064 96 29 a a DT blog-dshr-org-2064 96 30 “ " `` blog-dshr-org-2064 96 31 human human JJ blog-dshr-org-2064 96 32 blockchain blockchain NN blog-dshr-org-2064 96 33 ” " '' blog-dshr-org-2064 96 34 of of IN blog-dshr-org-2064 96 35 the the DT blog-dshr-org-2064 96 36 kind kind NN blog-dshr-org-2064 96 37 employed employ VBN blog-dshr-org-2064 96 38 by by IN blog-dshr-org-2064 96 39 traditional traditional JJ blog-dshr-org-2064 96 40 finance finance NN blog-dshr-org-2064 96 41 , , , blog-dshr-org-2064 96 42 is be VBZ blog-dshr-org-2064 96 43 at at IN blog-dshr-org-2064 96 44 high high JJ blog-dshr-org-2064 96 45 risk risk NN blog-dshr-org-2064 96 46 of of IN blog-dshr-org-2064 96 47 becoming become VBG blog-dshr-org-2064 96 48 the the DT blog-dshr-org-2064 96 49 next next JJ blog-dshr-org-2064 96 50 Mt. Mount NNP blog-dshr-org-2064 97 1 Gox gox NN blog-dshr-org-2064 97 2 ; ; : blog-dshr-org-2064 97 3 it -PRON- PRP blog-dshr-org-2064 97 4 is be VBZ blog-dshr-org-2064 97 5 not not RB blog-dshr-org-2064 97 6 going go VBG blog-dshr-org-2064 97 7 to to TO blog-dshr-org-2064 97 8 become become VB blog-dshr-org-2064 97 9 a a DT blog-dshr-org-2064 97 10 trustworthy trustworthy JJ blog-dshr-org-2064 97 11 financial financial JJ blog-dshr-org-2064 97 12 intermediary intermediary NN blog-dshr-org-2064 97 13 without without IN blog-dshr-org-2064 97 14 that that DT blog-dshr-org-2064 97 15 bureaucracy bureaucracy NN blog-dshr-org-2064 97 16 . . . blog-dshr-org-2064 98 1 Computers computer NNS blog-dshr-org-2064 98 2 and and CC blog-dshr-org-2064 98 3 networks network NNS blog-dshr-org-2064 98 4 are be VBP blog-dshr-org-2064 98 5 cheap cheap JJ blog-dshr-org-2064 98 6 . . . blog-dshr-org-2064 99 1 Scaling scale VBG blog-dshr-org-2064 99 2 computational computational JJ blog-dshr-org-2064 99 3 resources resource NNS blog-dshr-org-2064 99 4 requires require VBZ blog-dshr-org-2064 99 5 cheap cheap JJ blog-dshr-org-2064 99 6 additional additional JJ blog-dshr-org-2064 99 7 resources resource NNS blog-dshr-org-2064 99 8 . . . blog-dshr-org-2064 100 1 Scaling scale VBG blog-dshr-org-2064 100 2 human human JJ blog-dshr-org-2064 100 3 traditional traditional JJ blog-dshr-org-2064 100 4 institutions institution NNS blog-dshr-org-2064 100 5 in in IN blog-dshr-org-2064 100 6 a a DT blog-dshr-org-2064 100 7 reliable reliable JJ blog-dshr-org-2064 100 8 and and CC blog-dshr-org-2064 100 9 secure secure JJ blog-dshr-org-2064 100 10 manner manner NN blog-dshr-org-2064 100 11 requires require VBZ blog-dshr-org-2064 100 12 increasing increase VBG blog-dshr-org-2064 100 13 amounts amount NNS blog-dshr-org-2064 100 14 accountants accountant NNS blog-dshr-org-2064 100 15 , , , blog-dshr-org-2064 100 16 lawyers lawyer NNS blog-dshr-org-2064 100 17 , , , blog-dshr-org-2064 100 18 regulators regulator NNS blog-dshr-org-2064 100 19 , , , blog-dshr-org-2064 100 20 and and CC blog-dshr-org-2064 100 21 police police NNS blog-dshr-org-2064 100 22 , , , blog-dshr-org-2064 100 23 along along IN blog-dshr-org-2064 100 24 with with IN blog-dshr-org-2064 100 25 the the DT blog-dshr-org-2064 100 26 increase increase NN blog-dshr-org-2064 100 27 in in IN blog-dshr-org-2064 100 28 bureaucracy bureaucracy NN blog-dshr-org-2064 100 29 , , , blog-dshr-org-2064 100 30 risk risk NN blog-dshr-org-2064 100 31 , , , blog-dshr-org-2064 100 32 and and CC blog-dshr-org-2064 100 33 stress stress VB blog-dshr-org-2064 100 34 that that IN blog-dshr-org-2064 100 35 such such JJ blog-dshr-org-2064 100 36 institutions institution NNS blog-dshr-org-2064 100 37 entail entail VBP blog-dshr-org-2064 100 38 . . . blog-dshr-org-2064 101 1 Lawyers lawyer NNS blog-dshr-org-2064 101 2 are be VBP blog-dshr-org-2064 101 3 costly costly JJ blog-dshr-org-2064 101 4 . . . blog-dshr-org-2064 102 1 Regulation regulation NN blog-dshr-org-2064 102 2 is be VBZ blog-dshr-org-2064 102 3 to to IN blog-dshr-org-2064 102 4 the the DT blog-dshr-org-2064 102 5 moon moon NN blog-dshr-org-2064 102 6 . . . blog-dshr-org-2064 103 1 Computer computer NN blog-dshr-org-2064 103 2 science science NN blog-dshr-org-2064 103 3 secures secure VBZ blog-dshr-org-2064 103 4 money money NN blog-dshr-org-2064 103 5 far far RB blog-dshr-org-2064 103 6 better well RBR blog-dshr-org-2064 103 7 than than IN blog-dshr-org-2064 103 8 accountants accountant NNS blog-dshr-org-2064 103 9 , , , blog-dshr-org-2064 103 10 police police NNS blog-dshr-org-2064 103 11 , , , blog-dshr-org-2064 103 12 and and CC blog-dshr-org-2064 103 13 lawyers lawyer NNS blog-dshr-org-2064 103 14 . . . blog-dshr-org-2064 104 1 Given give VBN blog-dshr-org-2064 104 2 the the DT blog-dshr-org-2064 104 3 routine routine JJ blog-dshr-org-2064 104 4 heists heist NNS blog-dshr-org-2064 104 5 from from IN blog-dshr-org-2064 104 6 exchanges exchange NNS blog-dshr-org-2064 104 7 it -PRON- PRP blog-dshr-org-2064 104 8 is be VBZ blog-dshr-org-2064 104 9 clear clear JJ blog-dshr-org-2064 104 10 that that IN blog-dshr-org-2064 104 11 the the DT blog-dshr-org-2064 104 12 current current JJ blog-dshr-org-2064 104 13 Bitcoin Bitcoin NNP blog-dshr-org-2064 104 14 ecosystem ecosystem NN blog-dshr-org-2064 104 15 is be VBZ blog-dshr-org-2064 104 16 much much RB blog-dshr-org-2064 104 17 less less RBR blog-dshr-org-2064 104 18 secure secure JJ blog-dshr-org-2064 104 19 than than IN blog-dshr-org-2064 104 20 traditional traditional JJ blog-dshr-org-2064 104 21 financial financial JJ blog-dshr-org-2064 104 22 institutions institution NNS blog-dshr-org-2064 104 23 . . . blog-dshr-org-2064 105 1 And and CC blog-dshr-org-2064 105 2 imagine imagine VB blog-dshr-org-2064 105 3 if if IN blog-dshr-org-2064 105 4 the the DT blog-dshr-org-2064 105 5 huge huge JJ blog-dshr-org-2064 105 6 resources resource NNS blog-dshr-org-2064 105 7 devoted devote VBN blog-dshr-org-2064 105 8 to to IN blog-dshr-org-2064 105 9 running run VBG blog-dshr-org-2064 105 10 the the DT blog-dshr-org-2064 105 11 Bitcoin Bitcoin NNP blog-dshr-org-2064 105 12 blockchain blockchain NN blog-dshr-org-2064 105 13 were be VBD blog-dshr-org-2064 105 14 instead instead RB blog-dshr-org-2064 105 15 devoted devoted JJ blog-dshr-org-2064 105 16 to to IN blog-dshr-org-2064 105 17 additional additional JJ blog-dshr-org-2064 105 18 security security NN blog-dshr-org-2064 105 19 for for IN blog-dshr-org-2064 105 20 the the DT blog-dshr-org-2064 105 21 financial financial JJ blog-dshr-org-2064 105 22 institutions institution NNS blog-dshr-org-2064 105 23 ! ! . blog-dshr-org-2064 106 1 Szabo Szabo NNP blog-dshr-org-2064 106 2 is be VBZ blog-dshr-org-2064 106 3 correct correct JJ blog-dshr-org-2064 106 4 that that DT blog-dshr-org-2064 106 5 : : : blog-dshr-org-2064 106 6 In in IN blog-dshr-org-2064 106 7 computer computer NN blog-dshr-org-2064 106 8 science science NN blog-dshr-org-2064 106 9 there there EX blog-dshr-org-2064 106 10 are be VBP blog-dshr-org-2064 106 11 fundamental fundamental JJ blog-dshr-org-2064 106 12 security security NN blog-dshr-org-2064 106 13 versus versus IN blog-dshr-org-2064 106 14 performance performance NN blog-dshr-org-2064 106 15 tradeoffs tradeoff NNS blog-dshr-org-2064 106 16 . . . blog-dshr-org-2064 107 1 Bitcoin Bitcoin NNP blog-dshr-org-2064 107 2 's 's POS blog-dshr-org-2064 107 3 automated automate VBN blog-dshr-org-2064 107 4 integrity integrity NN blog-dshr-org-2064 107 5 comes come VBZ blog-dshr-org-2064 107 6 at at IN blog-dshr-org-2064 107 7 high high JJ blog-dshr-org-2064 107 8 costs cost NNS blog-dshr-org-2064 107 9 in in IN blog-dshr-org-2064 107 10 its -PRON- PRP$ blog-dshr-org-2064 107 11 performance performance NN blog-dshr-org-2064 107 12 and and CC blog-dshr-org-2064 107 13 resource resource NN blog-dshr-org-2064 107 14 usage usage NN blog-dshr-org-2064 107 15 . . . blog-dshr-org-2064 108 1 Nobody nobody NN blog-dshr-org-2064 108 2 has have VBZ blog-dshr-org-2064 108 3 discovered discover VBN blog-dshr-org-2064 108 4 any any DT blog-dshr-org-2064 108 5 way way NN blog-dshr-org-2064 108 6 to to TO blog-dshr-org-2064 108 7 greatly greatly RB blog-dshr-org-2064 108 8 increase increase VB blog-dshr-org-2064 108 9 the the DT blog-dshr-org-2064 108 10 computational computational JJ blog-dshr-org-2064 108 11 scalability scalability NN blog-dshr-org-2064 108 12 of of IN blog-dshr-org-2064 108 13 the the DT blog-dshr-org-2064 108 14 Bitcoin Bitcoin NNP blog-dshr-org-2064 108 15 blockchain blockchain NN blog-dshr-org-2064 108 16 , , , blog-dshr-org-2064 108 17 for for IN blog-dshr-org-2064 108 18 example example NN blog-dshr-org-2064 108 19 its -PRON- PRP$ blog-dshr-org-2064 108 20 transaction transaction NN blog-dshr-org-2064 108 21 throughput throughput NN blog-dshr-org-2064 108 22 , , , blog-dshr-org-2064 108 23 and and CC blog-dshr-org-2064 108 24 demonstrated demonstrate VBD blog-dshr-org-2064 108 25 that that IN blog-dshr-org-2064 108 26 this this DT blog-dshr-org-2064 108 27 improvement improvement NN blog-dshr-org-2064 108 28 does do VBZ blog-dshr-org-2064 108 29 not not RB blog-dshr-org-2064 108 30 compromise compromise VB blog-dshr-org-2064 108 31 Bitcoin Bitcoin NNP blog-dshr-org-2064 108 32 ’s ’s POS blog-dshr-org-2064 108 33 security security NN blog-dshr-org-2064 108 34 . . . blog-dshr-org-2064 109 1 The the DT blog-dshr-org-2064 109 2 LOCKSS LOCKSS NNP blog-dshr-org-2064 109 3 technology technology NN blog-dshr-org-2064 109 4 's 's POS blog-dshr-org-2064 109 5 automated automate VBN blog-dshr-org-2064 109 6 security security NN blog-dshr-org-2064 109 7 also also RB blog-dshr-org-2064 109 8 comes come VBZ blog-dshr-org-2064 109 9 from from IN blog-dshr-org-2064 109 10 using use VBG blog-dshr-org-2064 109 11 a a DT blog-dshr-org-2064 109 12 lot lot NN blog-dshr-org-2064 109 13 of of IN blog-dshr-org-2064 109 14 computational computational JJ blog-dshr-org-2064 109 15 resources resource NNS blog-dshr-org-2064 109 16 , , , blog-dshr-org-2064 109 17 although although IN blog-dshr-org-2064 109 18 by by IN blog-dshr-org-2064 109 19 doing do VBG blog-dshr-org-2064 109 20 so so RB blog-dshr-org-2064 109 21 it -PRON- PRP blog-dshr-org-2064 109 22 avoids avoid VBZ blog-dshr-org-2064 109 23 expensive expensive JJ blog-dshr-org-2064 109 24 and and CC blog-dshr-org-2064 109 25 time time NN blog-dshr-org-2064 109 26 - - HYPH blog-dshr-org-2064 109 27 consuming consume VBG blog-dshr-org-2064 109 28 copyright copyright NN blog-dshr-org-2064 109 29 negotiations negotiation NNS blog-dshr-org-2064 109 30 . . . blog-dshr-org-2064 110 1 But but CC blog-dshr-org-2064 110 2 then then RB blog-dshr-org-2064 110 3 Szabo Szabo NNP blog-dshr-org-2064 110 4 argues argue VBZ blog-dshr-org-2064 110 5 that that IN blog-dshr-org-2064 110 6 because because IN blog-dshr-org-2064 110 7 of of IN blog-dshr-org-2064 110 8 the the DT blog-dshr-org-2064 110 9 resource resource NN blog-dshr-org-2064 110 10 cost cost NN blog-dshr-org-2064 110 11 and and CC blog-dshr-org-2064 110 12 the the DT blog-dshr-org-2064 110 13 limited limited JJ blog-dshr-org-2064 110 14 transaction transaction NN blog-dshr-org-2064 110 15 throughput throughput NN blog-dshr-org-2064 110 16 , , , blog-dshr-org-2064 110 17 the the DT blog-dshr-org-2064 110 18 best good JJS blog-dshr-org-2064 110 19 that that WDT blog-dshr-org-2064 110 20 can can MD blog-dshr-org-2064 110 21 be be VB blog-dshr-org-2064 110 22 delivered deliver VBN blog-dshr-org-2064 110 23 is be VBZ blog-dshr-org-2064 110 24 a a DT blog-dshr-org-2064 110 25 reduced reduce VBN blog-dshr-org-2064 110 26 level level NN blog-dshr-org-2064 110 27 of of IN blog-dshr-org-2064 110 28 security security NN blog-dshr-org-2064 110 29 for for IN blog-dshr-org-2064 110 30 most most JJS blog-dshr-org-2064 110 31 transactions transaction NNS blog-dshr-org-2064 110 32 : : : blog-dshr-org-2064 110 33 Instead instead RB blog-dshr-org-2064 110 34 , , , blog-dshr-org-2064 110 35 a a DT blog-dshr-org-2064 110 36 less less JJR blog-dshr-org-2064 110 37 trust trust NN blog-dshr-org-2064 110 38 - - HYPH blog-dshr-org-2064 110 39 minimized minimize VBN blog-dshr-org-2064 110 40 peripheral peripheral JJ blog-dshr-org-2064 110 41 payment payment NN blog-dshr-org-2064 110 42 network network NN blog-dshr-org-2064 110 43 ( ( -LRB- blog-dshr-org-2064 110 44 possibly possibly RB blog-dshr-org-2064 110 45 Lightning Lightning NNP blog-dshr-org-2064 110 46 ) ) -RRB- blog-dshr-org-2064 110 47 will will MD blog-dshr-org-2064 110 48 be be VB blog-dshr-org-2064 110 49 needed need VBN blog-dshr-org-2064 110 50 to to TO blog-dshr-org-2064 110 51 bear bear VB blog-dshr-org-2064 110 52 a a DT blog-dshr-org-2064 110 53 larger large JJR blog-dshr-org-2064 110 54 number number NN blog-dshr-org-2064 110 55 of of IN blog-dshr-org-2064 110 56 lower low JJR blog-dshr-org-2064 110 57 - - HYPH blog-dshr-org-2064 110 58 value value NN blog-dshr-org-2064 110 59 bitcoin bitcoin NN blog-dshr-org-2064 110 60 - - HYPH blog-dshr-org-2064 110 61 denominated denominate VBN blog-dshr-org-2064 110 62 transactions transaction NNS blog-dshr-org-2064 110 63 than than IN blog-dshr-org-2064 110 64 Bitcoin Bitcoin NNP blog-dshr-org-2064 110 65 blockchain blockchain NNP blog-dshr-org-2064 110 66 is be VBZ blog-dshr-org-2064 110 67 capable capable JJ blog-dshr-org-2064 110 68 of of IN blog-dshr-org-2064 110 69 , , , blog-dshr-org-2064 110 70 using use VBG blog-dshr-org-2064 110 71 the the DT blog-dshr-org-2064 110 72 Bitcoin Bitcoin NNP blog-dshr-org-2064 110 73 blockchain blockchain NN blog-dshr-org-2064 110 74 to to TO blog-dshr-org-2064 110 75 periodically periodically RB blog-dshr-org-2064 110 76 settle settle VB blog-dshr-org-2064 110 77 with with IN blog-dshr-org-2064 110 78 one one CD blog-dshr-org-2064 110 79 high high JJ blog-dshr-org-2064 110 80 - - HYPH blog-dshr-org-2064 110 81 value value NN blog-dshr-org-2064 110 82 transaction transaction NN blog-dshr-org-2064 110 83 batches batch NNS blog-dshr-org-2064 110 84 of of IN blog-dshr-org-2064 110 85 peripheral peripheral JJ blog-dshr-org-2064 110 86 network network NN blog-dshr-org-2064 110 87 transactions transaction NNS blog-dshr-org-2064 110 88 . . . blog-dshr-org-2064 111 1 Despite despite IN blog-dshr-org-2064 111 2 the the DT blog-dshr-org-2064 111 3 need need NN blog-dshr-org-2064 111 4 for for IN blog-dshr-org-2064 111 5 peripheral peripheral JJ blog-dshr-org-2064 111 6 payment payment NN blog-dshr-org-2064 111 7 networks network NNS blog-dshr-org-2064 111 8 , , , blog-dshr-org-2064 111 9 Szabo Szabo NNP blog-dshr-org-2064 111 10 argues argue VBZ blog-dshr-org-2064 111 11 : : : blog-dshr-org-2064 111 12 Anybody anybody NN blog-dshr-org-2064 111 13 with with IN blog-dshr-org-2064 111 14 a a DT blog-dshr-org-2064 111 15 decent decent JJ blog-dshr-org-2064 111 16 Internet internet NN blog-dshr-org-2064 111 17 connection connection NN blog-dshr-org-2064 111 18 and and CC blog-dshr-org-2064 111 19 a a DT blog-dshr-org-2064 111 20 smart smart JJ blog-dshr-org-2064 111 21 phone phone NN blog-dshr-org-2064 111 22 who who WP blog-dshr-org-2064 111 23 can can MD blog-dshr-org-2064 111 24 pay pay VB blog-dshr-org-2064 111 25 $ $ $ blog-dshr-org-2064 111 26 0.20-$2 0.20-$2 CD blog-dshr-org-2064 111 27 transaction transaction NN blog-dshr-org-2064 111 28 fees fee NNS blog-dshr-org-2064 111 29 – – : blog-dshr-org-2064 111 30 substantially substantially RB blog-dshr-org-2064 111 31 lower low JJR blog-dshr-org-2064 111 32 than than IN blog-dshr-org-2064 111 33 current current JJ blog-dshr-org-2064 111 34 remitance remitance NN blog-dshr-org-2064 111 35 fees fee NNS blog-dshr-org-2064 111 36 -- -- : blog-dshr-org-2064 111 37 can can MD blog-dshr-org-2064 111 38 access access VB blog-dshr-org-2064 111 39 Bitcoin Bitcoin NNP blog-dshr-org-2064 111 40 any any RB blog-dshr-org-2064 111 41 where where WRB blog-dshr-org-2064 111 42 on on IN blog-dshr-org-2064 111 43 the the DT blog-dshr-org-2064 111 44 globe globe NN blog-dshr-org-2064 111 45 . . . blog-dshr-org-2064 112 1 Transaction transaction NN blog-dshr-org-2064 112 2 Fees fee NNS blog-dshr-org-2064 112 3 That that WDT blog-dshr-org-2064 112 4 was be VBD blog-dshr-org-2064 112 5 then then RB blog-dshr-org-2064 112 6 . . . blog-dshr-org-2064 113 1 Current current JJ blog-dshr-org-2064 113 2 transaction transaction NN blog-dshr-org-2064 113 3 fees fee NNS blog-dshr-org-2064 113 4 are be VBP blog-dshr-org-2064 113 5 in in IN blog-dshr-org-2064 113 6 the the DT blog-dshr-org-2064 113 7 region region NN blog-dshr-org-2064 113 8 of of IN blog-dshr-org-2064 113 9 $ $ $ blog-dshr-org-2064 113 10 50 50 CD blog-dshr-org-2064 113 11 , , , blog-dshr-org-2064 113 12 with with IN blog-dshr-org-2064 113 13 a a DT blog-dshr-org-2064 113 14 median median JJ blog-dshr-org-2064 113 15 transaction transaction NN blog-dshr-org-2064 113 16 size size NN blog-dshr-org-2064 113 17 of of IN blog-dshr-org-2064 113 18 about about IN blog-dshr-org-2064 113 19 $ $ $ blog-dshr-org-2064 113 20 4 4 CD blog-dshr-org-2064 113 21 K k NN blog-dshr-org-2064 113 22 , , , blog-dshr-org-2064 113 23 so so RB blog-dshr-org-2064 113 24 the the DT blog-dshr-org-2064 113 25 social social JJ blog-dshr-org-2064 113 26 scalability scalability NN blog-dshr-org-2064 113 27 of of IN blog-dshr-org-2064 113 28 Bitcoin Bitcoin NNP blog-dshr-org-2064 113 29 transactions transaction NNS blog-dshr-org-2064 113 30 no no RB blog-dshr-org-2064 113 31 longer long RBR blog-dshr-org-2064 113 32 extends extend VBZ blog-dshr-org-2064 113 33 to to IN blog-dshr-org-2064 113 34 " " `` blog-dshr-org-2064 113 35 Anybody anybody NN blog-dshr-org-2064 113 36 with with IN blog-dshr-org-2064 113 37 a a DT blog-dshr-org-2064 113 38 decent decent JJ blog-dshr-org-2064 113 39 Internet internet NN blog-dshr-org-2064 113 40 connection connection NN blog-dshr-org-2064 113 41 and and CC blog-dshr-org-2064 113 42 a a DT blog-dshr-org-2064 113 43 smart smart JJ blog-dshr-org-2064 113 44 phone phone NN blog-dshr-org-2064 113 45 " " '' blog-dshr-org-2064 113 46 . . . blog-dshr-org-2064 114 1 As as IN blog-dshr-org-2064 114 2 I -PRON- PRP blog-dshr-org-2064 114 3 wrote write VBD blog-dshr-org-2064 114 4 : : : blog-dshr-org-2064 114 5 To to TO blog-dshr-org-2064 114 6 oversimplify oversimplify VB blog-dshr-org-2064 114 7 , , , blog-dshr-org-2064 114 8 the the DT blog-dshr-org-2064 114 9 argument argument NN blog-dshr-org-2064 114 10 for for IN blog-dshr-org-2064 114 11 Bitcoin Bitcoin NNP blog-dshr-org-2064 114 12 and and CC blog-dshr-org-2064 114 13 its -PRON- PRP$ blog-dshr-org-2064 114 14 analogs analog NNS blog-dshr-org-2064 114 15 is be VBZ blog-dshr-org-2064 114 16 the the DT blog-dshr-org-2064 114 17 argument argument NN blog-dshr-org-2064 114 18 for for IN blog-dshr-org-2064 114 19 gold gold NN blog-dshr-org-2064 114 20 , , , blog-dshr-org-2064 114 21 that that IN blog-dshr-org-2064 114 22 because because IN blog-dshr-org-2064 114 23 the the DT blog-dshr-org-2064 114 24 supply supply NN blog-dshr-org-2064 114 25 is be VBZ blog-dshr-org-2064 114 26 limited limit VBN blog-dshr-org-2064 114 27 the the DT blog-dshr-org-2064 114 28 price price NN blog-dshr-org-2064 114 29 will will MD blog-dshr-org-2064 114 30 go go VB blog-dshr-org-2064 114 31 up up RP blog-dshr-org-2064 114 32 . . . blog-dshr-org-2064 115 1 The the DT blog-dshr-org-2064 115 2 history history NN blog-dshr-org-2064 115 3 of of IN blog-dshr-org-2064 115 4 the the DT blog-dshr-org-2064 115 5 block block NN blog-dshr-org-2064 115 6 size size NN blog-dshr-org-2064 115 7 increase increase NN blog-dshr-org-2064 115 8 shows show VBZ blog-dshr-org-2064 115 9 that that IN blog-dshr-org-2064 115 10 the the DT blog-dshr-org-2064 115 11 supply supply NN blog-dshr-org-2064 115 12 of of IN blog-dshr-org-2064 115 13 Bitcoin Bitcoin NNP blog-dshr-org-2064 115 14 transactions transaction NNS blog-dshr-org-2064 115 15 is be VBZ blog-dshr-org-2064 115 16 limited limit VBN blog-dshr-org-2064 115 17 to to IN blog-dshr-org-2064 115 18 something something NN blog-dshr-org-2064 115 19 around around IN blog-dshr-org-2064 115 20 4 4 CD blog-dshr-org-2064 115 21 per per IN blog-dshr-org-2064 115 22 second second NN blog-dshr-org-2064 115 23 . . . blog-dshr-org-2064 116 1 So so RB blog-dshr-org-2064 116 2 by by IN blog-dshr-org-2064 116 3 the the DT blog-dshr-org-2064 116 4 same same JJ blog-dshr-org-2064 116 5 argument argument NN blog-dshr-org-2064 116 6 that that WDT blog-dshr-org-2064 116 7 leads lead VBZ blog-dshr-org-2064 116 8 to to IN blog-dshr-org-2064 116 9 HODL HODL NNP blog-dshr-org-2064 116 10 - - HYPH blog-dshr-org-2064 116 11 ing ing NNP blog-dshr-org-2064 116 12 , , , blog-dshr-org-2064 116 13 the the DT blog-dshr-org-2064 116 14 cost cost NN blog-dshr-org-2064 116 15 of of IN blog-dshr-org-2064 116 16 getting get VBG blog-dshr-org-2064 116 17 out out RP blog-dshr-org-2064 116 18 when when WRB blog-dshr-org-2064 116 19 you -PRON- PRP blog-dshr-org-2064 116 20 decide decide VBP blog-dshr-org-2064 116 21 you -PRON- PRP blog-dshr-org-2064 116 22 ca can MD blog-dshr-org-2064 116 23 n't not RB blog-dshr-org-2064 116 24 HODL HODL NNP blog-dshr-org-2064 116 25 any any DT blog-dshr-org-2064 116 26 more more RBR blog-dshr-org-2064 116 27 will will MD blog-dshr-org-2064 116 28 always always RB blog-dshr-org-2064 116 29 go go VB blog-dshr-org-2064 116 30 up up RP blog-dshr-org-2064 116 31 . . . blog-dshr-org-2064 117 1 And and CC blog-dshr-org-2064 117 2 , , , blog-dshr-org-2064 117 3 in in IN blog-dshr-org-2064 117 4 particular particular JJ blog-dshr-org-2064 117 5 , , , blog-dshr-org-2064 117 6 it -PRON- PRP blog-dshr-org-2064 117 7 will will MD blog-dshr-org-2064 117 8 go go VB blog-dshr-org-2064 117 9 up up IN blog-dshr-org-2064 117 10 the the DT blog-dshr-org-2064 117 11 most most JJS blog-dshr-org-2064 117 12 when when WRB blog-dshr-org-2064 117 13 you -PRON- PRP blog-dshr-org-2064 117 14 need need VBP blog-dshr-org-2064 117 15 it -PRON- PRP blog-dshr-org-2064 117 16 the the DT blog-dshr-org-2064 117 17 most most RBS blog-dshr-org-2064 117 18 , , , blog-dshr-org-2064 117 19 when when WRB blog-dshr-org-2064 117 20 the the DT blog-dshr-org-2064 117 21 bubble bubble NN blog-dshr-org-2064 117 22 bursts burst NNS blog-dshr-org-2064 117 23 . . . blog-dshr-org-2064 118 1 Szabo Szabo NNP blog-dshr-org-2064 118 2 's 's POS blog-dshr-org-2064 118 3 outdated outdated JJ blog-dshr-org-2064 118 4 optimism optimism NN blog-dshr-org-2064 118 5 continues continue VBZ blog-dshr-org-2064 118 6 : : : blog-dshr-org-2064 118 7 When when WRB blog-dshr-org-2064 118 8 it -PRON- PRP blog-dshr-org-2064 118 9 comes come VBZ blog-dshr-org-2064 118 10 to to IN blog-dshr-org-2064 118 11 small small JJ blog-dshr-org-2064 118 12 - - HYPH blog-dshr-org-2064 118 13 b b NN blog-dshr-org-2064 118 14 bitcoin bitcoin NN blog-dshr-org-2064 118 15 , , , blog-dshr-org-2064 118 16 the the DT blog-dshr-org-2064 118 17 currency currency NN blog-dshr-org-2064 118 18 , , , blog-dshr-org-2064 118 19 there there EX blog-dshr-org-2064 118 20 is be VBZ blog-dshr-org-2064 118 21 nothing nothing NN blog-dshr-org-2064 118 22 impossible impossible JJ blog-dshr-org-2064 118 23 about about IN blog-dshr-org-2064 118 24 paying pay VBG blog-dshr-org-2064 118 25 retail retail NN blog-dshr-org-2064 118 26 with with IN blog-dshr-org-2064 118 27 bitcoin bitcoin NN blog-dshr-org-2064 118 28 the the DT blog-dshr-org-2064 118 29 way way NN blog-dshr-org-2064 118 30 you -PRON- PRP blog-dshr-org-2064 118 31 ’d ’d , blog-dshr-org-2064 118 32 pay pay VB blog-dshr-org-2064 118 33 with with IN blog-dshr-org-2064 118 34 a a DT blog-dshr-org-2064 118 35 fiat fiat JJ blog-dshr-org-2064 118 36 currency currency NN blog-dshr-org-2064 118 37 . . . blog-dshr-org-2064 119 1 ... ... : blog-dshr-org-2064 119 2 Gold gold NN blog-dshr-org-2064 119 3 can can MD blog-dshr-org-2064 119 4 have have VB blog-dshr-org-2064 119 5 value value NN blog-dshr-org-2064 119 6 anywhere anywhere RB blog-dshr-org-2064 119 7 in in IN blog-dshr-org-2064 119 8 the the DT blog-dshr-org-2064 119 9 world world NN blog-dshr-org-2064 119 10 and and CC blog-dshr-org-2064 119 11 is be VBZ blog-dshr-org-2064 119 12 immune immune JJ blog-dshr-org-2064 119 13 from from IN blog-dshr-org-2064 119 14 hyperinflation hyperinflation NN blog-dshr-org-2064 119 15 because because IN blog-dshr-org-2064 119 16 its -PRON- PRP$ blog-dshr-org-2064 119 17 value value NN blog-dshr-org-2064 119 18 does do VBZ blog-dshr-org-2064 119 19 n’t not RB blog-dshr-org-2064 119 20 depend depend VB blog-dshr-org-2064 119 21 on on IN blog-dshr-org-2064 119 22 a a DT blog-dshr-org-2064 119 23 central central JJ blog-dshr-org-2064 119 24 authority authority NN blog-dshr-org-2064 119 25 . . . blog-dshr-org-2064 120 1 Bitcoin bitcoin NN blog-dshr-org-2064 120 2 excels excel NNS blog-dshr-org-2064 120 3 at at IN blog-dshr-org-2064 120 4 both both PDT blog-dshr-org-2064 120 5 these these DT blog-dshr-org-2064 120 6 factors factor NNS blog-dshr-org-2064 120 7 and and CC blog-dshr-org-2064 120 8 runs run VBZ blog-dshr-org-2064 120 9 online online RB blog-dshr-org-2064 120 10 , , , blog-dshr-org-2064 120 11 enabling enable VBG blog-dshr-org-2064 120 12 somebody somebody NN blog-dshr-org-2064 120 13 in in IN blog-dshr-org-2064 120 14 Albania Albania NNP blog-dshr-org-2064 120 15 to to TO blog-dshr-org-2064 120 16 use use VB blog-dshr-org-2064 120 17 Bitcoin Bitcoin NNP blog-dshr-org-2064 120 18 to to TO blog-dshr-org-2064 120 19 pay pay VB blog-dshr-org-2064 120 20 somebody somebody NN blog-dshr-org-2064 120 21 in in IN blog-dshr-org-2064 120 22 Zimbabwe Zimbabwe NNP blog-dshr-org-2064 120 23 with with IN blog-dshr-org-2064 120 24 minimal minimal JJ blog-dshr-org-2064 120 25 trust trust NN blog-dshr-org-2064 120 26 in in IN blog-dshr-org-2064 120 27 or or CC blog-dshr-org-2064 120 28 and and CC blog-dshr-org-2064 120 29 no no DT blog-dshr-org-2064 120 30 payment payment NN blog-dshr-org-2064 120 31 of of IN blog-dshr-org-2064 120 32 quasi quasi JJ blog-dshr-org-2064 120 33 - - JJ blog-dshr-org-2064 120 34 monopoly monopoly JJ blog-dshr-org-2064 120 35 profits profit NNS blog-dshr-org-2064 120 36 to to IN blog-dshr-org-2064 120 37 intermediaries intermediary NNS blog-dshr-org-2064 120 38 , , , blog-dshr-org-2064 120 39 and and CC blog-dshr-org-2064 120 40 with with IN blog-dshr-org-2064 120 41 minimum minimum JJ blog-dshr-org-2064 120 42 vulnerability vulnerability NN blog-dshr-org-2064 120 43 to to IN blog-dshr-org-2064 120 44 third third JJ blog-dshr-org-2064 120 45 parties party NNS blog-dshr-org-2064 120 46 . . . blog-dshr-org-2064 121 1 Mining mining NN blog-dshr-org-2064 121 2 Pools pool NNS blog-dshr-org-2064 121 3 12/25/17 12/25/17 NNS blog-dshr-org-2064 121 4 They -PRON- PRP blog-dshr-org-2064 121 5 'd 'd MD blog-dshr-org-2064 121 6 better better RB blog-dshr-org-2064 121 7 be be VB blog-dshr-org-2064 121 8 paying pay VBG blog-dshr-org-2064 121 9 many many JJ blog-dshr-org-2064 121 10 tens ten NNS blog-dshr-org-2064 121 11 of of IN blog-dshr-org-2064 121 12 thousands thousand NNS blog-dshr-org-2064 121 13 of of IN blog-dshr-org-2064 121 14 dollars dollar NNS blog-dshr-org-2064 121 15 to to TO blog-dshr-org-2064 121 16 make make VB blog-dshr-org-2064 121 17 the the DT blog-dshr-org-2064 121 18 transaction transaction NN blog-dshr-org-2064 121 19 fees fee NNS blog-dshr-org-2064 121 20 to to IN blog-dshr-org-2064 121 21 the the DT blog-dshr-org-2064 121 22 quasi quasi JJ blog-dshr-org-2064 121 23 - - JJ blog-dshr-org-2064 121 24 monopoly monopoly JJ blog-dshr-org-2064 121 25 mining mining NN blog-dshr-org-2064 121 26 pools pool NNS blog-dshr-org-2064 121 27 ( ( -LRB- blog-dshr-org-2064 121 28 top top JJ blog-dshr-org-2064 121 29 6 6 CD blog-dshr-org-2064 121 30 pools pool NNS blog-dshr-org-2064 121 31 = = SYM blog-dshr-org-2064 121 32 79.8 79.8 CD blog-dshr-org-2064 121 33 % % NN blog-dshr-org-2064 121 34 of of IN blog-dshr-org-2064 121 35 the the DT blog-dshr-org-2064 121 36 mining mining NN blog-dshr-org-2064 121 37 power power NN blog-dshr-org-2064 121 38 ) ) -RRB- blog-dshr-org-2064 121 39 worth worth JJ blog-dshr-org-2064 121 40 the the DT blog-dshr-org-2064 121 41 candle candle NN blog-dshr-org-2064 121 42 . . . blog-dshr-org-2064 122 1 Bitcoin Bitcoin NNP blog-dshr-org-2064 122 2 just just RB blog-dshr-org-2064 122 3 lost lose VBD blog-dshr-org-2064 122 4 25 25 CD blog-dshr-org-2064 122 5 % % NN blog-dshr-org-2064 122 6 of of IN blog-dshr-org-2064 122 7 its -PRON- PRP$ blog-dshr-org-2064 122 8 " " `` blog-dshr-org-2064 122 9 value value NN blog-dshr-org-2064 122 10 " " '' blog-dshr-org-2064 122 11 in in IN blog-dshr-org-2064 122 12 a a DT blog-dshr-org-2064 122 13 day day NN blog-dshr-org-2064 122 14 , , , blog-dshr-org-2064 122 15 which which WDT blog-dshr-org-2064 122 16 would would MD blog-dshr-org-2064 122 17 count count VB blog-dshr-org-2064 122 18 as as IN blog-dshr-org-2064 122 19 hyperinflation hyperinflation NN blog-dshr-org-2064 122 20 if if IN blog-dshr-org-2064 122 21 it -PRON- PRP blog-dshr-org-2064 122 22 had have VBD blog-dshr-org-2064 122 23 n't not RB blog-dshr-org-2064 122 24 recently recently RB blog-dshr-org-2064 122 25 gained gain VBN blog-dshr-org-2064 122 26 25 25 CD blog-dshr-org-2064 122 27 % % NN blog-dshr-org-2064 122 28 in in IN blog-dshr-org-2064 122 29 a a DT blog-dshr-org-2064 122 30 day day NN blog-dshr-org-2064 122 31 . . . blog-dshr-org-2064 123 1 In in IN blog-dshr-org-2064 123 2 practice practice NN blog-dshr-org-2064 123 3 , , , blog-dshr-org-2064 123 4 they -PRON- PRP blog-dshr-org-2064 123 5 need need VBP blog-dshr-org-2064 123 6 to to TO blog-dshr-org-2064 123 7 trust trust VB blog-dshr-org-2064 123 8 exchanges exchange NNS blog-dshr-org-2064 123 9 . . . blog-dshr-org-2064 124 1 And and CC blog-dshr-org-2064 124 2 , , , blog-dshr-org-2064 124 3 as as IN blog-dshr-org-2064 124 4 David David NNP blog-dshr-org-2064 124 5 Gerard Gerard NNP blog-dshr-org-2064 124 6 recounts recount NNS blog-dshr-org-2064 124 7 in in IN blog-dshr-org-2064 124 8 Chapter chapter NN blog-dshr-org-2064 124 9 7 7 CD blog-dshr-org-2064 124 10 , , , blog-dshr-org-2064 124 11 retailers retailer NNS blog-dshr-org-2064 124 12 who who WP blog-dshr-org-2064 124 13 have have VBP blog-dshr-org-2064 124 14 tried try VBN blog-dshr-org-2064 124 15 accepting accept VBG blog-dshr-org-2064 124 16 Bitcoin Bitcoin NNP blog-dshr-org-2064 124 17 have have VBP blog-dshr-org-2064 124 18 found find VBN blog-dshr-org-2064 124 19 the the DT blog-dshr-org-2064 124 20 volatility volatility NN blog-dshr-org-2064 124 21 , , , blog-dshr-org-2064 124 22 the the DT blog-dshr-org-2064 124 23 uncertainty uncertainty NN blog-dshr-org-2064 124 24 of of IN blog-dshr-org-2064 124 25 transactions transaction NNS blog-dshr-org-2064 124 26 succeeding succeed VBG blog-dshr-org-2064 124 27 and and CC blog-dshr-org-2064 124 28 the the DT blog-dshr-org-2064 124 29 delays delay NNS blog-dshr-org-2064 124 30 impossible impossible JJ blog-dshr-org-2064 124 31 to to TO blog-dshr-org-2064 124 32 live live VB blog-dshr-org-2064 124 33 with with IN blog-dshr-org-2064 124 34 . . . blog-dshr-org-2064 125 1 Szabo Szabo NNP blog-dshr-org-2064 125 2 's 's POS blog-dshr-org-2064 125 3 discussion discussion NN blog-dshr-org-2064 125 4 of of IN blog-dshr-org-2064 125 5 blockchains blockchains NNP blog-dshr-org-2064 125 6 has have VBZ blog-dshr-org-2064 125 7 worn wear VBN blog-dshr-org-2064 125 8 better well JJR blog-dshr-org-2064 125 9 than than IN blog-dshr-org-2064 125 10 his -PRON- PRP$ blog-dshr-org-2064 125 11 discussion discussion NN blog-dshr-org-2064 125 12 of of IN blog-dshr-org-2064 125 13 cryptocurrencies cryptocurrencie NNS blog-dshr-org-2064 125 14 . . . blog-dshr-org-2064 126 1 It -PRON- PRP blog-dshr-org-2064 126 2 starts start VBZ blog-dshr-org-2064 126 3 with with IN blog-dshr-org-2064 126 4 a a DT blog-dshr-org-2064 126 5 useful useful JJ blog-dshr-org-2064 126 6 definition definition NN blog-dshr-org-2064 126 7 : : : blog-dshr-org-2064 126 8 It -PRON- PRP blog-dshr-org-2064 126 9 is be VBZ blog-dshr-org-2064 126 10 a a DT blog-dshr-org-2064 126 11 blockchain blockchain NN blog-dshr-org-2064 126 12 if if IN blog-dshr-org-2064 126 13 it -PRON- PRP blog-dshr-org-2064 126 14 has have VBZ blog-dshr-org-2064 126 15 blocks block NNS blog-dshr-org-2064 126 16 and and CC blog-dshr-org-2064 126 17 it -PRON- PRP blog-dshr-org-2064 126 18 has have VBZ blog-dshr-org-2064 126 19 chains chain NNS blog-dshr-org-2064 126 20 . . . blog-dshr-org-2064 127 1 The the DT blog-dshr-org-2064 127 2 “ " `` blog-dshr-org-2064 127 3 chains chain NNS blog-dshr-org-2064 127 4 ” " '' blog-dshr-org-2064 127 5 should should MD blog-dshr-org-2064 127 6 be be VB blog-dshr-org-2064 127 7 Merkle Merkle NNP blog-dshr-org-2064 127 8 trees tree NNS blog-dshr-org-2064 127 9 or or CC blog-dshr-org-2064 127 10 other other JJ blog-dshr-org-2064 127 11 cryptographic cryptographic JJ blog-dshr-org-2064 127 12 structures structure NNS blog-dshr-org-2064 127 13 with with IN blog-dshr-org-2064 127 14 ... ... : blog-dshr-org-2064 127 15 post post JJ blog-dshr-org-2064 127 16 - - JJ blog-dshr-org-2064 127 17 unforgeable unforgeable JJ blog-dshr-org-2064 127 18 integrity integrity NN blog-dshr-org-2064 127 19 . . . blog-dshr-org-2064 128 1 Also also RB blog-dshr-org-2064 128 2 the the DT blog-dshr-org-2064 128 3 transactions transaction NNS blog-dshr-org-2064 128 4 and and CC blog-dshr-org-2064 128 5 any any DT blog-dshr-org-2064 128 6 other other JJ blog-dshr-org-2064 128 7 data datum NNS blog-dshr-org-2064 128 8 whose whose WP$ blog-dshr-org-2064 128 9 integrity integrity NN blog-dshr-org-2064 128 10 is be VBZ blog-dshr-org-2064 128 11 protected protect VBN blog-dshr-org-2064 128 12 by by IN blog-dshr-org-2064 128 13 a a DT blog-dshr-org-2064 128 14 blockchain blockchain NN blog-dshr-org-2064 128 15 should should MD blog-dshr-org-2064 128 16 be be VB blog-dshr-org-2064 128 17 replicated replicate VBN blog-dshr-org-2064 128 18 in in IN blog-dshr-org-2064 128 19 a a DT blog-dshr-org-2064 128 20 way way NN blog-dshr-org-2064 128 21 objectively objectively RB blog-dshr-org-2064 128 22 tolerant tolerant JJ blog-dshr-org-2064 128 23 to to IN blog-dshr-org-2064 128 24 worst bad JJS blog-dshr-org-2064 128 25 - - HYPH blog-dshr-org-2064 128 26 case case NN blog-dshr-org-2064 128 27 malicious malicious JJ blog-dshr-org-2064 128 28 problems problem NNS blog-dshr-org-2064 128 29 and and CC blog-dshr-org-2064 128 30 actors actor NNS blog-dshr-org-2064 128 31 to to IN blog-dshr-org-2064 128 32 as as RB blog-dshr-org-2064 128 33 high high JJ blog-dshr-org-2064 128 34 a a DT blog-dshr-org-2064 128 35 degree degree NN blog-dshr-org-2064 128 36 as as IN blog-dshr-org-2064 128 37 possible possible JJ blog-dshr-org-2064 128 38 ( ( -LRB- blog-dshr-org-2064 128 39 typically typically RB blog-dshr-org-2064 128 40 the the DT blog-dshr-org-2064 128 41 system system NN blog-dshr-org-2064 128 42 can can MD blog-dshr-org-2064 128 43 behave behave VB blog-dshr-org-2064 128 44 as as RB blog-dshr-org-2064 128 45 previously previously RB blog-dshr-org-2064 128 46 specified specify VBN blog-dshr-org-2064 128 47 up up RP blog-dshr-org-2064 128 48 to to IN blog-dshr-org-2064 128 49 a a DT blog-dshr-org-2064 128 50 fraction fraction NN blog-dshr-org-2064 128 51 of of IN blog-dshr-org-2064 128 52 1/3 1/3 CD blog-dshr-org-2064 128 53 to to IN blog-dshr-org-2064 128 54 1/2 1/2 CD blog-dshr-org-2064 128 55 of of IN blog-dshr-org-2064 128 56 the the DT blog-dshr-org-2064 128 57 servers server NNS blog-dshr-org-2064 128 58 maliciously maliciously RB blog-dshr-org-2064 128 59 trying try VBG blog-dshr-org-2064 128 60 to to TO blog-dshr-org-2064 128 61 subvert subvert VB blog-dshr-org-2064 128 62 it -PRON- PRP blog-dshr-org-2064 128 63 to to TO blog-dshr-org-2064 128 64 behave behave VB blog-dshr-org-2064 128 65 differently differently RB blog-dshr-org-2064 128 66 ) ) -RRB- blog-dshr-org-2064 128 67 . . . blog-dshr-org-2064 129 1 and and CC blog-dshr-org-2064 129 2 defines define VBZ blog-dshr-org-2064 129 3 the the DT blog-dshr-org-2064 129 4 benefit benefit NN blog-dshr-org-2064 129 5 blockchains blockchain NNS blog-dshr-org-2064 129 6 provide provide VBP blog-dshr-org-2064 129 7 thus thus RB blog-dshr-org-2064 129 8 : : : blog-dshr-org-2064 129 9 To to TO blog-dshr-org-2064 129 10 say say VB blog-dshr-org-2064 129 11 that that IN blog-dshr-org-2064 129 12 data data NN blog-dshr-org-2064 129 13 is be VBZ blog-dshr-org-2064 129 14 post post JJ blog-dshr-org-2064 129 15 - - JJ blog-dshr-org-2064 129 16 unforgeable unforgeable JJ blog-dshr-org-2064 129 17 or or CC blog-dshr-org-2064 129 18 immutable immutable JJ blog-dshr-org-2064 129 19 means mean VBZ blog-dshr-org-2064 129 20 that that IN blog-dshr-org-2064 129 21 it -PRON- PRP blog-dshr-org-2064 129 22 ca can MD blog-dshr-org-2064 129 23 n’t not RB blog-dshr-org-2064 129 24 be be VB blog-dshr-org-2064 129 25 undetectably undetectably RB blog-dshr-org-2064 129 26 altered alter VBN blog-dshr-org-2064 129 27 after after IN blog-dshr-org-2064 129 28 being be VBG blog-dshr-org-2064 129 29 committed commit VBN blog-dshr-org-2064 129 30 to to IN blog-dshr-org-2064 129 31 the the DT blog-dshr-org-2064 129 32 blockchain blockchain NN blog-dshr-org-2064 129 33 . . . blog-dshr-org-2064 130 1 Contrary contrary JJ blog-dshr-org-2064 130 2 to to IN blog-dshr-org-2064 130 3 some some DT blog-dshr-org-2064 130 4 hype hype NN blog-dshr-org-2064 130 5 this this DT blog-dshr-org-2064 130 6 does do VBZ blog-dshr-org-2064 130 7 n’t not RB blog-dshr-org-2064 130 8 guarantee guarantee VB blog-dshr-org-2064 130 9 anything anything NN blog-dshr-org-2064 130 10 about about IN blog-dshr-org-2064 130 11 a a DT blog-dshr-org-2064 130 12 datum datum NN blog-dshr-org-2064 130 13 ’s ’s POS blog-dshr-org-2064 130 14 provenance provenance NN blog-dshr-org-2064 130 15 , , , blog-dshr-org-2064 130 16 or or CC blog-dshr-org-2064 130 17 its -PRON- PRP$ blog-dshr-org-2064 130 18 truth truth NN blog-dshr-org-2064 130 19 or or CC blog-dshr-org-2064 130 20 falsity falsity NN blog-dshr-org-2064 130 21 , , , blog-dshr-org-2064 130 22 before before IN blog-dshr-org-2064 130 23 it -PRON- PRP blog-dshr-org-2064 130 24 was be VBD blog-dshr-org-2064 130 25 committed commit VBN blog-dshr-org-2064 130 26 to to IN blog-dshr-org-2064 130 27 the the DT blog-dshr-org-2064 130 28 blockchain blockchain NN blog-dshr-org-2064 130 29 . . . blog-dshr-org-2064 131 1 but but CC blog-dshr-org-2064 131 2 this this DT blog-dshr-org-2064 131 3 does do VBZ blog-dshr-org-2064 131 4 n't not RB blog-dshr-org-2064 131 5 eliminate eliminate VB blog-dshr-org-2064 131 6 the the DT blog-dshr-org-2064 131 7 need need NN blog-dshr-org-2064 131 8 for for IN blog-dshr-org-2064 131 9 ( ( -LRB- blog-dshr-org-2064 131 10 trusted trust VBN blog-dshr-org-2064 131 11 ) ) -RRB- blog-dshr-org-2064 131 12 governance governance NN blog-dshr-org-2064 131 13 because because IN blog-dshr-org-2064 131 14 51 51 CD blog-dshr-org-2064 131 15 % % NN blog-dshr-org-2064 131 16 or or CC blog-dshr-org-2064 131 17 less less JJR blog-dshr-org-2064 131 18 attacks attack NNS blog-dshr-org-2064 131 19 are be VBP blog-dshr-org-2064 131 20 possible possible JJ blog-dshr-org-2064 131 21 : : : blog-dshr-org-2064 131 22 and and CC blog-dshr-org-2064 131 23 because because IN blog-dshr-org-2064 131 24 of of IN blog-dshr-org-2064 131 25 the the DT blog-dshr-org-2064 131 26 ( ( -LRB- blog-dshr-org-2064 131 27 hopefully hopefully RB blog-dshr-org-2064 131 28 very very RB blog-dshr-org-2064 131 29 rare rare JJ blog-dshr-org-2064 131 30 ) ) -RRB- blog-dshr-org-2064 131 31 need need VBP blog-dshr-org-2064 131 32 to to TO blog-dshr-org-2064 131 33 update update VB blog-dshr-org-2064 131 34 software software NN blog-dshr-org-2064 131 35 in in IN blog-dshr-org-2064 131 36 a a DT blog-dshr-org-2064 131 37 manner manner NN blog-dshr-org-2064 131 38 that that WDT blog-dshr-org-2064 131 39 renders render VBZ blog-dshr-org-2064 131 40 prior prior RB blog-dshr-org-2064 131 41 blocks block VBZ blog-dshr-org-2064 131 42 invalid invalid NNP blog-dshr-org-2064 131 43 – – : blog-dshr-org-2064 131 44 an an DT blog-dshr-org-2064 131 45 even even RB blog-dshr-org-2064 131 46 riskier risky JJR blog-dshr-org-2064 131 47 situation situation NN blog-dshr-org-2064 131 48 called call VBD blog-dshr-org-2064 131 49 a a DT blog-dshr-org-2064 131 50 hard hard JJ blog-dshr-org-2064 131 51 fork fork NN blog-dshr-org-2064 131 52 -- -- : blog-dshr-org-2064 131 53 blockchains blockchain NNS blog-dshr-org-2064 131 54 also also RB blog-dshr-org-2064 131 55 need need VBP blog-dshr-org-2064 131 56 a a DT blog-dshr-org-2064 131 57 human human JJ blog-dshr-org-2064 131 58 governance governance NN blog-dshr-org-2064 131 59 layer layer NN blog-dshr-org-2064 131 60 that that WDT blog-dshr-org-2064 131 61 is be VBZ blog-dshr-org-2064 131 62 vulnerable vulnerable JJ blog-dshr-org-2064 131 63 to to IN blog-dshr-org-2064 131 64 fork fork VB blog-dshr-org-2064 131 65 politics politic NNS blog-dshr-org-2064 131 66 . . . blog-dshr-org-2064 132 1 The the DT blog-dshr-org-2064 132 2 possibility possibility NN blog-dshr-org-2064 132 3 of of IN blog-dshr-org-2064 132 4 51 51 CD blog-dshr-org-2064 132 5 % % NN blog-dshr-org-2064 132 6 attacks attack NNS blog-dshr-org-2064 132 7 means mean VBZ blog-dshr-org-2064 132 8 that that IN blog-dshr-org-2064 132 9 it -PRON- PRP blog-dshr-org-2064 132 10 is be VBZ blog-dshr-org-2064 132 11 important important JJ blog-dshr-org-2064 132 12 to to TO blog-dshr-org-2064 132 13 identify identify VB blog-dshr-org-2064 132 14 who who WP blog-dshr-org-2064 132 15 is be VBZ blog-dshr-org-2064 132 16 behind behind IN blog-dshr-org-2064 132 17 the the DT blog-dshr-org-2064 132 18 powerful powerful JJ blog-dshr-org-2064 132 19 miners miner NNS blog-dshr-org-2064 132 20 . . . blog-dshr-org-2064 133 1 Szabo Szabo NNP blog-dshr-org-2064 133 2 's 's POS blog-dshr-org-2064 133 3 earlier early JJR blog-dshr-org-2064 133 4 " " `` blog-dshr-org-2064 133 5 bit bit NN blog-dshr-org-2064 133 6 gold gold NN blog-dshr-org-2064 133 7 " " '' blog-dshr-org-2064 133 8 was be VBD blog-dshr-org-2064 133 9 based base VBN blog-dshr-org-2064 133 10 on on IN blog-dshr-org-2064 133 11 his -PRON- PRP$ blog-dshr-org-2064 133 12 " " `` blog-dshr-org-2064 133 13 secure secure JJ blog-dshr-org-2064 133 14 property property NN blog-dshr-org-2064 133 15 titles title NNS blog-dshr-org-2064 133 16 " " '' blog-dshr-org-2064 133 17 : : : blog-dshr-org-2064 133 18 Also also RB blog-dshr-org-2064 133 19 like like UH blog-dshr-org-2064 133 20 today today NN blog-dshr-org-2064 133 21 ’s ’s POS blog-dshr-org-2064 133 22 private private JJ blog-dshr-org-2064 133 23 blockchains blockchain NNS blog-dshr-org-2064 133 24 , , , blog-dshr-org-2064 133 25 secure secure JJ blog-dshr-org-2064 133 26 property property NN blog-dshr-org-2064 133 27 titles title NNS blog-dshr-org-2064 133 28 assumed assume VBN blog-dshr-org-2064 133 29 and and CC blog-dshr-org-2064 133 30 required require VBN blog-dshr-org-2064 133 31 securely securely RB blog-dshr-org-2064 133 32 distinguishable distinguishable JJ blog-dshr-org-2064 133 33 and and CC blog-dshr-org-2064 133 34 countable countable JJ blog-dshr-org-2064 133 35 nodes node NNS blog-dshr-org-2064 133 36 . . . blog-dshr-org-2064 134 1 Given give VBN blog-dshr-org-2064 134 2 the the DT blog-dshr-org-2064 134 3 objective objective JJ blog-dshr-org-2064 134 4 51 51 CD blog-dshr-org-2064 134 5 % % NN blog-dshr-org-2064 134 6 hashrate hashrate NN blog-dshr-org-2064 134 7 attack attack NN blog-dshr-org-2064 134 8 limit limit NN blog-dshr-org-2064 134 9 to to IN blog-dshr-org-2064 134 10 some some DT blog-dshr-org-2064 134 11 important important JJ blog-dshr-org-2064 134 12 security security NN blog-dshr-org-2064 134 13 goals goal NNS blog-dshr-org-2064 134 14 of of IN blog-dshr-org-2064 134 15 public public JJ blog-dshr-org-2064 134 16 blockchains blockchain NNS blog-dshr-org-2064 134 17 like like IN blog-dshr-org-2064 134 18 Bitcoin Bitcoin NNP blog-dshr-org-2064 134 19 and and CC blog-dshr-org-2064 134 20 Ethereum Ethereum NNP blog-dshr-org-2064 134 21 , , , blog-dshr-org-2064 134 22 we -PRON- PRP blog-dshr-org-2064 134 23 actually actually RB blog-dshr-org-2064 134 24 do do VBP blog-dshr-org-2064 134 25 care care VB blog-dshr-org-2064 134 26 about about IN blog-dshr-org-2064 134 27 the the DT blog-dshr-org-2064 134 28 distinguishable distinguishable JJ blog-dshr-org-2064 134 29 identity identity NN blog-dshr-org-2064 134 30 of of IN blog-dshr-org-2064 134 31 the the DT blog-dshr-org-2064 134 32 most most RBS blog-dshr-org-2064 134 33 powerful powerful JJ blog-dshr-org-2064 134 34 miners miner NNS blog-dshr-org-2064 134 35 to to TO blog-dshr-org-2064 134 36 answer answer VB blog-dshr-org-2064 134 37 the the DT blog-dshr-org-2064 134 38 question question NN blog-dshr-org-2064 134 39 “ " `` blog-dshr-org-2064 134 40 can can MD blog-dshr-org-2064 134 41 somebody somebody NN blog-dshr-org-2064 134 42 convince convince VB blog-dshr-org-2064 134 43 and and CC blog-dshr-org-2064 134 44 coordinate coordinate VB blog-dshr-org-2064 134 45 the the DT blog-dshr-org-2064 134 46 51 51 CD blog-dshr-org-2064 134 47 % % NN blog-dshr-org-2064 134 48 ? ? . blog-dshr-org-2064 135 1 Or or CC blog-dshr-org-2064 135 2 the the DT blog-dshr-org-2064 135 3 49 49 CD blog-dshr-org-2064 135 4 % % NN blog-dshr-org-2064 135 5 of of IN blog-dshr-org-2064 135 6 the the DT blog-dshr-org-2064 135 7 top top JJ blog-dshr-org-2064 135 8 three three CD blog-dshr-org-2064 135 9 pools pool NNS blog-dshr-org-2064 135 10 . . . blog-dshr-org-2064 136 1 Identification identification NN blog-dshr-org-2064 136 2 of of IN blog-dshr-org-2064 136 3 the the DT blog-dshr-org-2064 136 4 nodes node NNS blog-dshr-org-2064 136 5 is be VBZ blog-dshr-org-2064 136 6 the the DT blog-dshr-org-2064 136 7 basic basic JJ blog-dshr-org-2064 136 8 difference difference NN blog-dshr-org-2064 136 9 between between IN blog-dshr-org-2064 136 10 public public JJ blog-dshr-org-2064 136 11 and and CC blog-dshr-org-2064 136 12 private private JJ blog-dshr-org-2064 136 13 blockchains blockchain NNS blog-dshr-org-2064 136 14 : : : blog-dshr-org-2064 136 15 So so CC blog-dshr-org-2064 136 16 I -PRON- PRP blog-dshr-org-2064 136 17 think think VBP blog-dshr-org-2064 136 18 some some DT blog-dshr-org-2064 136 19 of of IN blog-dshr-org-2064 136 20 the the DT blog-dshr-org-2064 136 21 “ " `` blog-dshr-org-2064 136 22 private private JJ blog-dshr-org-2064 136 23 blockchains blockchain NNS blog-dshr-org-2064 136 24 ” " '' blog-dshr-org-2064 136 25 qualify qualify VBP blog-dshr-org-2064 136 26 as as IN blog-dshr-org-2064 136 27 bona bona FW blog-dshr-org-2064 136 28 fide fide JJ blog-dshr-org-2064 136 29 blockchains blockchain NNS blog-dshr-org-2064 136 30 ; ; : blog-dshr-org-2064 136 31 others other NNS blog-dshr-org-2064 136 32 should should MD blog-dshr-org-2064 136 33 go go VB blog-dshr-org-2064 136 34 under under IN blog-dshr-org-2064 136 35 the the DT blog-dshr-org-2064 136 36 broader broad JJR blog-dshr-org-2064 136 37 rubric rubric NN blog-dshr-org-2064 136 38 of of IN blog-dshr-org-2064 136 39 “ " `` blog-dshr-org-2064 136 40 distributed distribute VBN blog-dshr-org-2064 136 41 ledger ledger JJ blog-dshr-org-2064 136 42 ” " '' blog-dshr-org-2064 136 43 or or CC blog-dshr-org-2064 136 44 “ " `` blog-dshr-org-2064 136 45 shared share VBN blog-dshr-org-2064 136 46 database database NN blog-dshr-org-2064 136 47 ” " '' blog-dshr-org-2064 136 48 or or CC blog-dshr-org-2064 136 49 similar similar JJ blog-dshr-org-2064 136 50 . . . blog-dshr-org-2064 137 1 They -PRON- PRP blog-dshr-org-2064 137 2 are be VBP blog-dshr-org-2064 137 3 all all RB blog-dshr-org-2064 137 4 very very RB blog-dshr-org-2064 137 5 different different JJ blog-dshr-org-2064 137 6 from from IN blog-dshr-org-2064 137 7 and and CC blog-dshr-org-2064 137 8 not not RB blog-dshr-org-2064 137 9 nearly nearly RB blog-dshr-org-2064 137 10 as as RB blog-dshr-org-2064 137 11 socially socially RB blog-dshr-org-2064 137 12 scalable scalable JJ blog-dshr-org-2064 137 13 as as IN blog-dshr-org-2064 137 14 public public JJ blog-dshr-org-2064 137 15 and and CC blog-dshr-org-2064 137 16 permissionless permissionless NN blog-dshr-org-2064 137 17 blockchains blockchain NNS blog-dshr-org-2064 137 18 like like IN blog-dshr-org-2064 137 19 Bitcoin Bitcoin NNP blog-dshr-org-2064 137 20 and and CC blog-dshr-org-2064 137 21 Ethereum Ethereum NNP blog-dshr-org-2064 137 22 . . . blog-dshr-org-2064 138 1 All all DT blog-dshr-org-2064 138 2 of of IN blog-dshr-org-2064 138 3 the the DT blog-dshr-org-2064 138 4 following follow VBG blog-dshr-org-2064 138 5 are be VBP blog-dshr-org-2064 138 6 very very RB blog-dshr-org-2064 138 7 similar similar JJ blog-dshr-org-2064 138 8 in in IN blog-dshr-org-2064 138 9 requiring require VBG blog-dshr-org-2064 138 10 an an DT blog-dshr-org-2064 138 11 securely securely RB blog-dshr-org-2064 138 12 identified identify VBN blog-dshr-org-2064 138 13 ( ( -LRB- blog-dshr-org-2064 138 14 distinguishable distinguishable JJ blog-dshr-org-2064 138 15 and and CC blog-dshr-org-2064 138 16 countable countable JJ blog-dshr-org-2064 138 17 ) ) -RRB- blog-dshr-org-2064 138 18 group group NN blog-dshr-org-2064 138 19 of of IN blog-dshr-org-2064 138 20 servers server NNS blog-dshr-org-2064 138 21 rather rather RB blog-dshr-org-2064 138 22 than than IN blog-dshr-org-2064 138 23 the the DT blog-dshr-org-2064 138 24 arbitrary arbitrary JJ blog-dshr-org-2064 138 25 anonymous anonymous JJ blog-dshr-org-2064 138 26 membership membership NN blog-dshr-org-2064 138 27 of of IN blog-dshr-org-2064 138 28 miners miner NNS blog-dshr-org-2064 138 29 in in IN blog-dshr-org-2064 138 30 public public JJ blog-dshr-org-2064 138 31 blockchains blockchain NNS blog-dshr-org-2064 138 32 . . . blog-dshr-org-2064 139 1 In in IN blog-dshr-org-2064 139 2 other other JJ blog-dshr-org-2064 139 3 words word NNS blog-dshr-org-2064 139 4 , , , blog-dshr-org-2064 139 5 they -PRON- PRP blog-dshr-org-2064 139 6 require require VBP blog-dshr-org-2064 139 7 some some DT blog-dshr-org-2064 139 8 other other JJ blog-dshr-org-2064 139 9 , , , blog-dshr-org-2064 139 10 usually usually RB blog-dshr-org-2064 139 11 far far RB blog-dshr-org-2064 139 12 less less RBR blog-dshr-org-2064 139 13 socially socially RB blog-dshr-org-2064 139 14 scalable scalable JJ blog-dshr-org-2064 139 15 , , , blog-dshr-org-2064 139 16 solution solution NN blog-dshr-org-2064 139 17 to to IN blog-dshr-org-2064 139 18 the the DT blog-dshr-org-2064 139 19 Sybil Sybil NNP blog-dshr-org-2064 139 20 ( ( -LRB- blog-dshr-org-2064 139 21 sockpuppet sockpuppet NNP blog-dshr-org-2064 139 22 ) ) -RRB- blog-dshr-org-2064 139 23 attack attack NN blog-dshr-org-2064 139 24 problem problem NN blog-dshr-org-2064 139 25 : : : blog-dshr-org-2064 139 26 Private private JJ blog-dshr-org-2064 139 27 blockchains blockchain NNS blog-dshr-org-2064 139 28 The the DT blog-dshr-org-2064 139 29 “ " `` blog-dshr-org-2064 139 30 federated federated JJ blog-dshr-org-2064 139 31 ” " '' blog-dshr-org-2064 139 32 model model NN blog-dshr-org-2064 139 33 of of IN blog-dshr-org-2064 139 34 sidechains sidechain NNS blog-dshr-org-2064 139 35 ( ( -LRB- blog-dshr-org-2064 139 36 Alas alas UH blog-dshr-org-2064 139 37 , , , blog-dshr-org-2064 139 38 nobody nobody NN blog-dshr-org-2064 139 39 has have VBZ blog-dshr-org-2064 139 40 figured figure VBN blog-dshr-org-2064 139 41 out out RP blog-dshr-org-2064 139 42 how how WRB blog-dshr-org-2064 139 43 to to TO blog-dshr-org-2064 139 44 do do VB blog-dshr-org-2064 139 45 sidechains sidechain NNS blog-dshr-org-2064 139 46 with with IN blog-dshr-org-2064 139 47 any any DT blog-dshr-org-2064 139 48 lesser less JJR blog-dshr-org-2064 139 49 degree degree NN blog-dshr-org-2064 139 50 of of IN blog-dshr-org-2064 139 51 required require VBN blog-dshr-org-2064 139 52 trust trust NN blog-dshr-org-2064 139 53 , , , blog-dshr-org-2064 139 54 despite despite IN blog-dshr-org-2064 139 55 previous previous JJ blog-dshr-org-2064 139 56 hopes hope NNS blog-dshr-org-2064 139 57 or or CC blog-dshr-org-2064 139 58 claims claim NNS blog-dshr-org-2064 139 59 ) ) -RRB- blog-dshr-org-2064 139 60 . . . blog-dshr-org-2064 140 1 Sidechains sidechain NNS blog-dshr-org-2064 140 2 can can MD blog-dshr-org-2064 140 3 also also RB blog-dshr-org-2064 140 4 be be VB blog-dshr-org-2064 140 5 private private JJ blog-dshr-org-2064 140 6 chains chain NNS blog-dshr-org-2064 140 7 , , , blog-dshr-org-2064 140 8 and and CC blog-dshr-org-2064 140 9 it -PRON- PRP blog-dshr-org-2064 140 10 ’s ’ VBZ blog-dshr-org-2064 140 11 a a DT blog-dshr-org-2064 140 12 nice nice JJ blog-dshr-org-2064 140 13 fit fit NN blog-dshr-org-2064 140 14 because because IN blog-dshr-org-2064 140 15 their -PRON- PRP$ blog-dshr-org-2064 140 16 architectures architecture NNS blog-dshr-org-2064 140 17 and and CC blog-dshr-org-2064 140 18 external external JJ blog-dshr-org-2064 140 19 dependencies dependency NNS blog-dshr-org-2064 140 20 ( ( -LRB- blog-dshr-org-2064 140 21 e.g. e.g. RB blog-dshr-org-2064 141 1 on on IN blog-dshr-org-2064 141 2 a a DT blog-dshr-org-2064 141 3 PKI PKI NNP blog-dshr-org-2064 141 4 ) ) -RRB- blog-dshr-org-2064 141 5 are be VBP blog-dshr-org-2064 141 6 similar similar JJ blog-dshr-org-2064 141 7 . . . blog-dshr-org-2064 142 1 Multisig Multisig NNP blog-dshr-org-2064 142 2 - - HYPH blog-dshr-org-2064 142 3 based base VBN blog-dshr-org-2064 142 4 schemes scheme NNS blog-dshr-org-2064 142 5 , , , blog-dshr-org-2064 142 6 even even RB blog-dshr-org-2064 142 7 when when WRB blog-dshr-org-2064 142 8 done do VBN blog-dshr-org-2064 142 9 with with IN blog-dshr-org-2064 142 10 blockchain blockchain NNP blog-dshr-org-2064 142 11 - - HYPH blog-dshr-org-2064 142 12 based base VBN blog-dshr-org-2064 142 13 smart smart JJ blog-dshr-org-2064 142 14 contracts contract NNS blog-dshr-org-2064 142 15 Threshold Threshold NNP blog-dshr-org-2064 142 16 - - HYPH blog-dshr-org-2064 142 17 based base VBN blog-dshr-org-2064 142 18 “ " `` blog-dshr-org-2064 142 19 oracle oracle NN blog-dshr-org-2064 142 20 ” " '' blog-dshr-org-2064 142 21 architectures architecture VBZ blog-dshr-org-2064 142 22 for for IN blog-dshr-org-2064 142 23 moving move VBG blog-dshr-org-2064 142 24 off off IN blog-dshr-org-2064 142 25 - - HYPH blog-dshr-org-2064 142 26 blockchain blockchain JJ blog-dshr-org-2064 142 27 data datum NNS blog-dshr-org-2064 142 28 onto onto IN blog-dshr-org-2064 142 29 blockchains blockchain NNS blog-dshr-org-2064 142 30 Like like IN blog-dshr-org-2064 142 31 blockchains blockchain NNS blog-dshr-org-2064 142 32 , , , blog-dshr-org-2064 142 33 the the DT blog-dshr-org-2064 142 34 LOCKSS LOCKSS NNP blog-dshr-org-2064 142 35 technology technology NN blog-dshr-org-2064 142 36 can can MD blog-dshr-org-2064 142 37 be be VB blog-dshr-org-2064 142 38 used use VBN blog-dshr-org-2064 142 39 in in IN blog-dshr-org-2064 142 40 public public NN blog-dshr-org-2064 142 41 ( ( -LRB- blog-dshr-org-2064 142 42 as as IN blog-dshr-org-2064 142 43 in in IN blog-dshr-org-2064 142 44 the the DT blog-dshr-org-2064 142 45 Global Global NNP blog-dshr-org-2064 142 46 LOCKSS LOCKSS NNP blog-dshr-org-2064 142 47 Network Network NNP blog-dshr-org-2064 142 48 ) ) -RRB- blog-dshr-org-2064 142 49 or or CC blog-dshr-org-2064 142 50 private private JJ blog-dshr-org-2064 142 51 ( ( -LRB- blog-dshr-org-2064 142 52 as as IN blog-dshr-org-2064 142 53 in in IN blog-dshr-org-2064 142 54 the the DT blog-dshr-org-2064 142 55 CLOCKSS CLOCKSS NNP blog-dshr-org-2064 142 56 Archive Archive NNP blog-dshr-org-2064 142 57 ) ) -RRB- blog-dshr-org-2064 142 58 networks network NNS blog-dshr-org-2064 142 59 . . . blog-dshr-org-2064 143 1 The the DT blog-dshr-org-2064 143 2 CLOCKSS CLOCKSS NNP blog-dshr-org-2064 143 3 network network NN blog-dshr-org-2064 143 4 identifies identify VBZ blog-dshr-org-2064 143 5 its -PRON- PRP$ blog-dshr-org-2064 143 6 nodes node NNS blog-dshr-org-2064 143 7 using use VBG blog-dshr-org-2064 143 8 a a DT blog-dshr-org-2064 143 9 Public public JJ blog-dshr-org-2064 143 10 Key Key NNP blog-dshr-org-2064 143 11 Infrastructure Infrastructure NNP blog-dshr-org-2064 143 12 ( ( -LRB- blog-dshr-org-2064 143 13 PKI PKI NNP blog-dshr-org-2064 143 14 ) ) -RRB- blog-dshr-org-2064 143 15 : : : blog-dshr-org-2064 143 16 The the DT blog-dshr-org-2064 143 17 dominant dominant JJ blog-dshr-org-2064 143 18 , , , blog-dshr-org-2064 143 19 but but CC blog-dshr-org-2064 143 20 usually usually RB blog-dshr-org-2064 143 21 not not RB blog-dshr-org-2064 143 22 very very RB blog-dshr-org-2064 143 23 socially socially RB blog-dshr-org-2064 143 24 scalable scalable JJ blog-dshr-org-2064 143 25 , , , blog-dshr-org-2064 143 26 way way NN blog-dshr-org-2064 143 27 to to TO blog-dshr-org-2064 143 28 identify identify VB blog-dshr-org-2064 143 29 a a DT blog-dshr-org-2064 143 30 group group NN blog-dshr-org-2064 143 31 of of IN blog-dshr-org-2064 143 32 servers server NNS blog-dshr-org-2064 143 33 is be VBZ blog-dshr-org-2064 143 34 with with IN blog-dshr-org-2064 143 35 a a DT blog-dshr-org-2064 143 36 PKI PKI NNP blog-dshr-org-2064 143 37 based base VBN blog-dshr-org-2064 143 38 on on IN blog-dshr-org-2064 143 39 trusted trust VBN blog-dshr-org-2064 143 40 certificate certificate NN blog-dshr-org-2064 143 41 authorities authority NNS blog-dshr-org-2064 143 42 ( ( -LRB- blog-dshr-org-2064 143 43 CAs CAs NNP blog-dshr-org-2064 143 44 ) ) -RRB- blog-dshr-org-2064 143 45 . . . blog-dshr-org-2064 144 1 To to TO blog-dshr-org-2064 144 2 avoid avoid VB blog-dshr-org-2064 144 3 the the DT blog-dshr-org-2064 144 4 problem problem NN blog-dshr-org-2064 144 5 that that WDT blog-dshr-org-2064 144 6 merely merely RB blog-dshr-org-2064 144 7 trusted trust VBD blog-dshr-org-2064 144 8 third third JJ blog-dshr-org-2064 144 9 parties party NNS blog-dshr-org-2064 144 10 are be VBP blog-dshr-org-2064 144 11 security security NN blog-dshr-org-2064 144 12 holes hole NNS blog-dshr-org-2064 144 13 , , , blog-dshr-org-2064 144 14 reliable reliable JJ blog-dshr-org-2064 144 15 CAs ca NNS blog-dshr-org-2064 144 16 themselves -PRON- PRP blog-dshr-org-2064 144 17 must must MD blog-dshr-org-2064 144 18 be be VB blog-dshr-org-2064 144 19 expensive expensive JJ blog-dshr-org-2064 144 20 , , , blog-dshr-org-2064 144 21 labor labor NN blog-dshr-org-2064 144 22 - - HYPH blog-dshr-org-2064 144 23 intensive intensive JJ blog-dshr-org-2064 144 24 bureaucracies bureaucracy NNS blog-dshr-org-2064 144 25 that that WDT blog-dshr-org-2064 144 26 often often RB blog-dshr-org-2064 144 27 do do VBP blog-dshr-org-2064 144 28 extensive extensive JJ blog-dshr-org-2064 144 29 background background NN blog-dshr-org-2064 144 30 checks check NNS blog-dshr-org-2064 144 31 themselves -PRON- PRP blog-dshr-org-2064 144 32 or or CC blog-dshr-org-2064 144 33 rely rely VB blog-dshr-org-2064 144 34 on on IN blog-dshr-org-2064 144 35 others other NNS blog-dshr-org-2064 144 36 ( ( -LRB- blog-dshr-org-2064 144 37 e.g. e.g. RB blog-dshr-org-2064 145 1 Dun Dun NNP blog-dshr-org-2064 145 2 and and CC blog-dshr-org-2064 145 3 Bradstreet Bradstreet NNP blog-dshr-org-2064 145 4 for for IN blog-dshr-org-2064 145 5 businesses business NNS blog-dshr-org-2064 145 6 ) ) -RRB- blog-dshr-org-2064 145 7 to to TO blog-dshr-org-2064 145 8 do do VB blog-dshr-org-2064 145 9 so so RB blog-dshr-org-2064 145 10 . . . blog-dshr-org-2064 146 1 Public public JJ blog-dshr-org-2064 146 2 certificate certificate NN blog-dshr-org-2064 146 3 authorities authority NNS blog-dshr-org-2064 146 4 have have VBP blog-dshr-org-2064 146 5 proven prove VBN blog-dshr-org-2064 146 6 not not RB blog-dshr-org-2064 146 7 trustworthy trustworthy JJ blog-dshr-org-2064 146 8 but but CC blog-dshr-org-2064 146 9 private private JJ blog-dshr-org-2064 146 10 CAs ca NNS blog-dshr-org-2064 146 11 are be VBP blog-dshr-org-2064 146 12 within within IN blog-dshr-org-2064 146 13 the the DT blog-dshr-org-2064 146 14 trust trust NN blog-dshr-org-2064 146 15 border border NN blog-dshr-org-2064 146 16 of of IN blog-dshr-org-2064 146 17 the the DT blog-dshr-org-2064 146 18 sponsoring sponsoring JJ blog-dshr-org-2064 146 19 organization organization NN blog-dshr-org-2064 146 20 . . . blog-dshr-org-2064 147 1 Szabo Szabo NNP blog-dshr-org-2064 147 2 is be VBZ blog-dshr-org-2064 147 3 right right JJ blog-dshr-org-2064 147 4 that that DT blog-dshr-org-2064 147 5 : : : blog-dshr-org-2064 147 6 We -PRON- PRP blog-dshr-org-2064 147 7 need need VBP blog-dshr-org-2064 147 8 more more RBR blog-dshr-org-2064 147 9 socially socially RB blog-dshr-org-2064 147 10 scalable scalable JJ blog-dshr-org-2064 147 11 ways way NNS blog-dshr-org-2064 147 12 to to TO blog-dshr-org-2064 147 13 securely securely RB blog-dshr-org-2064 147 14 count count VB blog-dshr-org-2064 147 15 nodes node NNS blog-dshr-org-2064 147 16 , , , blog-dshr-org-2064 147 17 or or CC blog-dshr-org-2064 147 18 to to TO blog-dshr-org-2064 147 19 put put VB blog-dshr-org-2064 147 20 it -PRON- PRP blog-dshr-org-2064 147 21 another another DT blog-dshr-org-2064 147 22 way way NN blog-dshr-org-2064 147 23 to to IN blog-dshr-org-2064 147 24 with with IN blog-dshr-org-2064 147 25 as as RB blog-dshr-org-2064 147 26 much much JJ blog-dshr-org-2064 147 27 robustness robustness NN blog-dshr-org-2064 147 28 against against IN blog-dshr-org-2064 147 29 corruption corruption NN blog-dshr-org-2064 147 30 as as IN blog-dshr-org-2064 147 31 possible possible JJ blog-dshr-org-2064 147 32 , , , blog-dshr-org-2064 147 33 assess assess VB blog-dshr-org-2064 147 34 contributions contribution NNS blog-dshr-org-2064 147 35 to to IN blog-dshr-org-2064 147 36 securing secure VBG blog-dshr-org-2064 147 37 the the DT blog-dshr-org-2064 147 38 integrity integrity NN blog-dshr-org-2064 147 39 of of IN blog-dshr-org-2064 147 40 a a DT blog-dshr-org-2064 147 41 blockchain blockchain NN blog-dshr-org-2064 147 42 . . . blog-dshr-org-2064 148 1 But but CC blog-dshr-org-2064 148 2 in in IN blog-dshr-org-2064 148 3 practice practice NN blog-dshr-org-2064 148 4 , , , blog-dshr-org-2064 148 5 the the DT blog-dshr-org-2064 148 6 ideal ideal JJ blog-dshr-org-2064 148 7 picture picture NN blog-dshr-org-2064 148 8 of of IN blog-dshr-org-2064 148 9 blockchains blockchain NNS blog-dshr-org-2064 148 10 has have VBZ blog-dshr-org-2064 148 11 n't not RB blog-dshr-org-2064 148 12 worked work VBN blog-dshr-org-2064 148 13 out out RP blog-dshr-org-2064 148 14 for for IN blog-dshr-org-2064 148 15 Bitcoin Bitcoin NNP blog-dshr-org-2064 148 16 : : : blog-dshr-org-2064 148 17 That that DT blog-dshr-org-2064 148 18 is be VBZ blog-dshr-org-2064 148 19 what what WP blog-dshr-org-2064 148 20 proof proof NN blog-dshr-org-2064 148 21 - - HYPH blog-dshr-org-2064 148 22 of of IN blog-dshr-org-2064 148 23 - - HYPH blog-dshr-org-2064 148 24 work work NN blog-dshr-org-2064 148 25 and and CC blog-dshr-org-2064 148 26 broadcast broadcast NN blog-dshr-org-2064 148 27 - - HYPH blog-dshr-org-2064 148 28 replication replication NN blog-dshr-org-2064 148 29 are be VBP blog-dshr-org-2064 148 30 about about IN blog-dshr-org-2064 148 31 : : : blog-dshr-org-2064 148 32 greatly greatly RB blog-dshr-org-2064 148 33 sacrificing sacrifice VBG blog-dshr-org-2064 148 34 computational computational JJ blog-dshr-org-2064 148 35 scalability scalability NN blog-dshr-org-2064 148 36 in in IN blog-dshr-org-2064 148 37 order order NN blog-dshr-org-2064 148 38 to to TO blog-dshr-org-2064 148 39 improve improve VB blog-dshr-org-2064 148 40 social social JJ blog-dshr-org-2064 148 41 scalability scalability NN blog-dshr-org-2064 148 42 . . . blog-dshr-org-2064 149 1 That that DT blog-dshr-org-2064 149 2 is be VBZ blog-dshr-org-2064 149 3 Satoshi Satoshi NNP blog-dshr-org-2064 149 4 ’s ’s POS blog-dshr-org-2064 149 5 brilliant brilliant JJ blog-dshr-org-2064 149 6 tradeoff tradeoff NN blog-dshr-org-2064 149 7 . . . blog-dshr-org-2064 150 1 It -PRON- PRP blog-dshr-org-2064 150 2 is be VBZ blog-dshr-org-2064 150 3 brilliant brilliant JJ blog-dshr-org-2064 150 4 because because IN blog-dshr-org-2064 150 5 humans human NNS blog-dshr-org-2064 150 6 are be VBP blog-dshr-org-2064 150 7 far far RB blog-dshr-org-2064 150 8 more more RBR blog-dshr-org-2064 150 9 expensive expensive JJ blog-dshr-org-2064 150 10 than than IN blog-dshr-org-2064 150 11 computers computer NNS blog-dshr-org-2064 150 12 and and CC blog-dshr-org-2064 150 13 that that DT blog-dshr-org-2064 150 14 gap gap NN blog-dshr-org-2064 150 15 widens widen VBZ blog-dshr-org-2064 150 16 further further RB blog-dshr-org-2064 150 17 each each DT blog-dshr-org-2064 150 18 year year NN blog-dshr-org-2064 150 19 . . . blog-dshr-org-2064 151 1 And and CC blog-dshr-org-2064 151 2 it -PRON- PRP blog-dshr-org-2064 151 3 is be VBZ blog-dshr-org-2064 151 4 brilliant brilliant JJ blog-dshr-org-2064 151 5 because because IN blog-dshr-org-2064 151 6 it -PRON- PRP blog-dshr-org-2064 151 7 allows allow VBZ blog-dshr-org-2064 151 8 one one PRP blog-dshr-org-2064 151 9 to to TO blog-dshr-org-2064 151 10 seamlessly seamlessly RB blog-dshr-org-2064 151 11 and and CC blog-dshr-org-2064 151 12 securely securely RB blog-dshr-org-2064 151 13 work work VB blog-dshr-org-2064 151 14 across across IN blog-dshr-org-2064 151 15 human human JJ blog-dshr-org-2064 151 16 trust trust NN blog-dshr-org-2064 151 17 boundaries boundary NNS blog-dshr-org-2064 151 18 ( ( -LRB- blog-dshr-org-2064 151 19 e.g. e.g. RB blog-dshr-org-2064 152 1 national national NNP blog-dshr-org-2064 152 2 borders borders NNP blog-dshr-org-2064 152 3 ) ) -RRB- blog-dshr-org-2064 152 4 , , , blog-dshr-org-2064 152 5 in in IN blog-dshr-org-2064 152 6 contrast contrast NN blog-dshr-org-2064 152 7 to to TO blog-dshr-org-2064 152 8 “ " `` blog-dshr-org-2064 152 9 call call VB blog-dshr-org-2064 152 10 - - HYPH blog-dshr-org-2064 152 11 the the DT blog-dshr-org-2064 152 12 - - HYPH blog-dshr-org-2064 152 13 cop cop NN blog-dshr-org-2064 152 14 ” " '' blog-dshr-org-2064 152 15 architectures architecture VBZ blog-dshr-org-2064 152 16 like like IN blog-dshr-org-2064 152 17 PayPal PayPal NNP blog-dshr-org-2064 152 18 and and CC blog-dshr-org-2064 152 19 Visa Visa NNP blog-dshr-org-2064 152 20 that that WDT blog-dshr-org-2064 152 21 continually continually RB blog-dshr-org-2064 152 22 depend depend VBP blog-dshr-org-2064 152 23 on on IN blog-dshr-org-2064 152 24 expensive expensive JJ blog-dshr-org-2064 152 25 , , , blog-dshr-org-2064 152 26 error error NN blog-dshr-org-2064 152 27 - - HYPH blog-dshr-org-2064 152 28 prone prone JJ blog-dshr-org-2064 152 29 , , , blog-dshr-org-2064 152 30 and and CC blog-dshr-org-2064 152 31 sometimes sometimes RB blog-dshr-org-2064 152 32 corruptible corruptible JJ blog-dshr-org-2064 152 33 bureaucracies bureaucracy NNS blog-dshr-org-2064 152 34 to to TO blog-dshr-org-2064 152 35 function function VB blog-dshr-org-2064 152 36 with with IN blog-dshr-org-2064 152 37 a a DT blog-dshr-org-2064 152 38 reasonable reasonable JJ blog-dshr-org-2064 152 39 amount amount NN blog-dshr-org-2064 152 40 of of IN blog-dshr-org-2064 152 41 integrity integrity NN blog-dshr-org-2064 152 42 . . . blog-dshr-org-2064 153 1 Total total JJ blog-dshr-org-2064 153 2 Daily Daily NNP blog-dshr-org-2064 153 3 Transaction Transaction NNP blog-dshr-org-2064 153 4 Fees fee NNS blog-dshr-org-2064 153 5 With with IN blog-dshr-org-2064 153 6 the the DT blog-dshr-org-2064 153 7 overhead overhead JJ blog-dshr-org-2064 153 8 cost cost NN blog-dshr-org-2064 153 9 of of IN blog-dshr-org-2064 153 10 transactions transaction NNS blog-dshr-org-2064 153 11 currently currently RB blog-dshr-org-2064 153 12 running run VBG blog-dshr-org-2064 153 13 at at RB blog-dshr-org-2064 153 14 well well RB blog-dshr-org-2064 153 15 over over IN blog-dshr-org-2064 153 16 $ $ $ blog-dshr-org-2064 153 17 10M 10m CD blog-dshr-org-2064 153 18 / / SYM blog-dshr-org-2064 153 19 day day NN blog-dshr-org-2064 153 20 its -PRON- PRP$ blog-dshr-org-2064 153 21 not not RB blog-dshr-org-2064 153 22 clear clear JJ blog-dshr-org-2064 153 23 that that IN blog-dshr-org-2064 153 24 " " `` blog-dshr-org-2064 153 25 humans human NNS blog-dshr-org-2064 153 26 are be VBP blog-dshr-org-2064 153 27 far far RB blog-dshr-org-2064 153 28 more more RBR blog-dshr-org-2064 153 29 expensive expensive JJ blog-dshr-org-2064 153 30 than than IN blog-dshr-org-2064 153 31 computers computer NNS blog-dshr-org-2064 153 32 " " '' blog-dshr-org-2064 153 33 . . . blog-dshr-org-2064 154 1 With with IN blog-dshr-org-2064 154 2 almost almost RB blog-dshr-org-2064 154 3 daily daily JJ blog-dshr-org-2064 154 4 reports report NNS blog-dshr-org-2064 154 5 of of IN blog-dshr-org-2064 154 6 thefts theft NNS blog-dshr-org-2064 154 7 over over IN blog-dshr-org-2064 154 8 $ $ $ blog-dshr-org-2064 154 9 10 10 CD blog-dshr-org-2064 154 10 M M NNP blog-dshr-org-2064 154 11 Bitcoin Bitcoin NNP blog-dshr-org-2064 154 12 lacks lack VBZ blog-dshr-org-2064 154 13 " " `` blog-dshr-org-2064 154 14 a a DT blog-dshr-org-2064 154 15 reasonable reasonable JJ blog-dshr-org-2064 154 16 amount amount NN blog-dshr-org-2064 154 17 of of IN blog-dshr-org-2064 154 18 integrity integrity NN blog-dshr-org-2064 154 19 " " '' blog-dshr-org-2064 154 20 at at IN blog-dshr-org-2064 154 21 the the DT blog-dshr-org-2064 154 22 level level NN blog-dshr-org-2064 154 23 most most JJS blog-dshr-org-2064 154 24 people people NNS blog-dshr-org-2064 154 25 interact interact VBP blog-dshr-org-2064 154 26 with with IN blog-dshr-org-2064 154 27 it -PRON- PRP blog-dshr-org-2064 154 28 . . . blog-dshr-org-2064 155 1 It -PRON- PRP blog-dshr-org-2064 155 2 is be VBZ blog-dshr-org-2064 155 3 possible possible JJ blog-dshr-org-2064 155 4 that that IN blog-dshr-org-2064 155 5 other other JJ blog-dshr-org-2064 155 6 public public JJ blog-dshr-org-2064 155 7 blockchain blockchain NN blog-dshr-org-2064 155 8 applications application NNS blog-dshr-org-2064 155 9 might may MD blog-dshr-org-2064 155 10 not not RB blog-dshr-org-2064 155 11 suffer suffer VB blog-dshr-org-2064 155 12 these these DT blog-dshr-org-2064 155 13 problems problem NNS blog-dshr-org-2064 155 14 . . . blog-dshr-org-2064 156 1 But but CC blog-dshr-org-2064 156 2 mining mining NN blog-dshr-org-2064 156 3 blocks block NNS blog-dshr-org-2064 156 4 needs need VBZ blog-dshr-org-2064 156 5 to to TO blog-dshr-org-2064 156 6 be be VB blog-dshr-org-2064 156 7 costly costly JJ blog-dshr-org-2064 156 8 for for IN blog-dshr-org-2064 156 9 the the DT blog-dshr-org-2064 156 10 chain chain NN blog-dshr-org-2064 156 11 to to TO blog-dshr-org-2064 156 12 deter deter VB blog-dshr-org-2064 156 13 Sybil Sybil NNP blog-dshr-org-2064 156 14 attacks attack NNS blog-dshr-org-2064 156 15 , , , blog-dshr-org-2064 156 16 and and CC blog-dshr-org-2064 156 17 these these DT blog-dshr-org-2064 156 18 costs cost NNS blog-dshr-org-2064 156 19 need need VBP blog-dshr-org-2064 156 20 to to TO blog-dshr-org-2064 156 21 be be VB blog-dshr-org-2064 156 22 covered cover VBN blog-dshr-org-2064 156 23 . . . blog-dshr-org-2064 157 1 So so RB blog-dshr-org-2064 157 2 , , , blog-dshr-org-2064 157 3 as as IN blog-dshr-org-2064 157 4 I -PRON- PRP blog-dshr-org-2064 157 5 argued argue VBD blog-dshr-org-2064 157 6 in in IN blog-dshr-org-2064 157 7 Economies Economies NNPS blog-dshr-org-2064 157 8 of of IN blog-dshr-org-2064 157 9 Scale Scale NNP blog-dshr-org-2064 157 10 in in IN blog-dshr-org-2064 157 11 Peer Peer NNP blog-dshr-org-2064 157 12 - - HYPH blog-dshr-org-2064 157 13 to to IN blog-dshr-org-2064 157 14 - - HYPH blog-dshr-org-2064 157 15 Peer Peer NNP blog-dshr-org-2064 157 16 Networks Networks NNPS blog-dshr-org-2064 157 17 , , , blog-dshr-org-2064 157 18 there there EX blog-dshr-org-2064 157 19 has have VBZ blog-dshr-org-2064 157 20 to to TO blog-dshr-org-2064 157 21 be be VB blog-dshr-org-2064 157 22 an an DT blog-dshr-org-2064 157 23 exchange exchange NN blog-dshr-org-2064 157 24 rate rate NN blog-dshr-org-2064 157 25 between between IN blog-dshr-org-2064 157 26 the the DT blog-dshr-org-2064 157 27 chains chain NNS blog-dshr-org-2064 157 28 " " `` blog-dshr-org-2064 157 29 coins coin NNS blog-dshr-org-2064 157 30 " " '' blog-dshr-org-2064 157 31 and and CC blog-dshr-org-2064 157 32 the the DT blog-dshr-org-2064 157 33 fiat fiat NNP blog-dshr-org-2064 157 34 currencies currency NNS blog-dshr-org-2064 157 35 that that WDT blog-dshr-org-2064 157 36 equipment equipment NN blog-dshr-org-2064 157 37 and and CC blog-dshr-org-2064 157 38 power power NN blog-dshr-org-2064 157 39 vendors vendor NNS blog-dshr-org-2064 157 40 accept accept VBP blog-dshr-org-2064 157 41 . . . blog-dshr-org-2064 158 1 Economies economy NNS blog-dshr-org-2064 158 2 of of IN blog-dshr-org-2064 158 3 scale scale NN blog-dshr-org-2064 158 4 will will MD blog-dshr-org-2064 158 5 apply apply VB blog-dshr-org-2064 158 6 , , , blog-dshr-org-2064 158 7 and and CC blog-dshr-org-2064 158 8 drive drive VB blog-dshr-org-2064 158 9 centralization centralization NN blog-dshr-org-2064 158 10 of of IN blog-dshr-org-2064 158 11 the the DT blog-dshr-org-2064 158 12 network network NN blog-dshr-org-2064 158 13 . . . blog-dshr-org-2064 159 1 If if IN blog-dshr-org-2064 159 2 the the DT blog-dshr-org-2064 159 3 " " `` blog-dshr-org-2064 159 4 coins coin NNS blog-dshr-org-2064 159 5 " " '' blog-dshr-org-2064 159 6 become become VBP blog-dshr-org-2064 159 7 , , , blog-dshr-org-2064 159 8 as as IN blog-dshr-org-2064 159 9 Bitcoins bitcoin NNS blog-dshr-org-2064 159 10 did do VBD blog-dshr-org-2064 159 11 , , , blog-dshr-org-2064 159 12 channels channel NNS blog-dshr-org-2064 159 13 for for IN blog-dshr-org-2064 159 14 flight flight NN blog-dshr-org-2064 159 15 capital capital NN blog-dshr-org-2064 159 16 and and CC blog-dshr-org-2064 159 17 speculation speculation NN blog-dshr-org-2064 159 18 the the DT blog-dshr-org-2064 159 19 network network NN blog-dshr-org-2064 159 20 will will MD blog-dshr-org-2064 159 21 also also RB blog-dshr-org-2064 159 22 become become VB blog-dshr-org-2064 159 23 a a DT blog-dshr-org-2064 159 24 target target NN blog-dshr-org-2064 159 25 for for IN blog-dshr-org-2064 159 26 crime crime NN blog-dshr-org-2064 159 27 . . . blog-dshr-org-2064 160 1 Private private JJ blog-dshr-org-2064 160 2 blockchains blockchain NNS blog-dshr-org-2064 160 3 escape escape VBP blog-dshr-org-2064 160 4 these these DT blog-dshr-org-2064 160 5 problems problem NNS blog-dshr-org-2064 160 6 , , , blog-dshr-org-2064 160 7 but but CC blog-dshr-org-2064 160 8 they -PRON- PRP blog-dshr-org-2064 160 9 lack lack VBP blog-dshr-org-2064 160 10 social social JJ blog-dshr-org-2064 160 11 scalability scalability NN blog-dshr-org-2064 160 12 and and CC blog-dshr-org-2064 160 13 have have VB blog-dshr-org-2064 160 14 single single JJ blog-dshr-org-2064 160 15 points point NNS blog-dshr-org-2064 160 16 of of IN blog-dshr-org-2064 160 17 failure failure NN blog-dshr-org-2064 160 18 ; ; : blog-dshr-org-2064 160 19 their -PRON- PRP$ blog-dshr-org-2064 160 20 advantages advantage NNS blog-dshr-org-2064 160 21 over over IN blog-dshr-org-2064 160 22 more more RBR blog-dshr-org-2064 160 23 conventional conventional JJ blog-dshr-org-2064 160 24 and and CC blog-dshr-org-2064 160 25 efficient efficient JJ blog-dshr-org-2064 160 26 systems system NNS blog-dshr-org-2064 160 27 are be VBP blog-dshr-org-2064 160 28 unclear unclear JJ blog-dshr-org-2064 160 29 . . . blog-dshr-org-2064 161 1 Posted post VBN blog-dshr-org-2064 161 2 by by IN blog-dshr-org-2064 161 3 David David NNP blog-dshr-org-2064 161 4 . . . blog-dshr-org-2064 162 1 at at IN blog-dshr-org-2064 162 2 9:00 9:00 CD blog-dshr-org-2064 162 3 AM AM NNP blog-dshr-org-2064 162 4 Labels Labels NNPS blog-dshr-org-2064 162 5 : : : blog-dshr-org-2064 162 6 bitcoin bitcoin NN blog-dshr-org-2064 162 7 , , , blog-dshr-org-2064 162 8 distributed distribute VBN blog-dshr-org-2064 162 9 web web NN blog-dshr-org-2064 162 10 , , , blog-dshr-org-2064 162 11 security security NN blog-dshr-org-2064 162 12 , , , blog-dshr-org-2064 162 13 techno techno NN blog-dshr-org-2064 162 14 - - HYPH blog-dshr-org-2064 162 15 hype hype NNP blog-dshr-org-2064 162 16 3 3 CD blog-dshr-org-2064 162 17 comments comment NNS blog-dshr-org-2064 162 18 : : : blog-dshr-org-2064 162 19 Anonymous Anonymous NNP blog-dshr-org-2064 162 20 said say VBD blog-dshr-org-2064 162 21 ... ... : blog-dshr-org-2064 162 22 « « `` blog-dshr-org-2064 162 23 Szabo Szabo NNP blog-dshr-org-2064 162 24 's 's POS blog-dshr-org-2064 162 25 discussion discussion NN blog-dshr-org-2064 162 26 of of IN blog-dshr-org-2064 162 27 blockchains blockchains NNP blog-dshr-org-2064 162 28 has have VBZ blog-dshr-org-2064 162 29 worn wear VBN blog-dshr-org-2064 162 30 better well JJR blog-dshr-org-2064 162 31 than than IN blog-dshr-org-2064 162 32 his -PRON- PRP$ blog-dshr-org-2064 162 33 discussion discussion NN blog-dshr-org-2064 162 34 of of IN blog-dshr-org-2064 162 35 cryptocurrencies cryptocurrencie NNS blog-dshr-org-2064 162 36 . . . blog-dshr-org-2064 163 1 It -PRON- PRP blog-dshr-org-2064 163 2 starts start VBZ blog-dshr-org-2064 163 3 with with IN blog-dshr-org-2064 163 4 a a DT blog-dshr-org-2064 163 5 useful useful JJ blog-dshr-org-2064 163 6 definition definition NN blog-dshr-org-2064 163 7 : : : blog-dshr-org-2064 163 8 » » `` blog-dshr-org-2064 163 9 I -PRON- PRP blog-dshr-org-2064 163 10 dunno dunno VBP blog-dshr-org-2064 163 11 why why WRB blog-dshr-org-2064 163 12 techies techie NNS blog-dshr-org-2064 163 13 pay pay VBP blog-dshr-org-2064 163 14 so so RB blog-dshr-org-2064 163 15 much much JJ blog-dshr-org-2064 163 16 attention attention NN blog-dshr-org-2064 163 17 to to IN blog-dshr-org-2064 163 18 " " `` blog-dshr-org-2064 163 19 blockchain blockchain NNP blog-dshr-org-2064 163 20 " " '' blog-dshr-org-2064 163 21 coins coin NNS blog-dshr-org-2064 163 22 , , , blog-dshr-org-2064 163 23 the the DT blog-dshr-org-2064 163 24 issues issue NNS blog-dshr-org-2064 163 25 within within IN blog-dshr-org-2064 163 26 etc etc FW blog-dshr-org-2064 163 27 . . . blog-dshr-org-2064 164 1 have have VBP blog-dshr-org-2064 164 2 been be VBN blog-dshr-org-2064 164 3 thoroughly thoroughly RB blog-dshr-org-2064 164 4 discussed discuss VBN blog-dshr-org-2064 164 5 for for IN blog-dshr-org-2064 164 6 decades decade NNS blog-dshr-org-2064 164 7 . . . blog-dshr-org-2064 165 1 The the DT blog-dshr-org-2064 165 2 only only JJ blog-dshr-org-2064 165 3 big big JJ blog-dshr-org-2064 165 4 deal deal NN blog-dshr-org-2064 165 5 is be VBZ blog-dshr-org-2064 165 6 that that IN blog-dshr-org-2064 165 7 a a DT blog-dshr-org-2064 165 8 lot lot NN blog-dshr-org-2064 165 9 of of IN blog-dshr-org-2064 165 10 " " `` blog-dshr-org-2064 165 11 greater great JJR blog-dshr-org-2064 165 12 fools fool NNS blog-dshr-org-2064 165 13 " " '' blog-dshr-org-2064 165 14 have have VBP blog-dshr-org-2064 165 15 rushed rush VBN blog-dshr-org-2064 165 16 into into IN blog-dshr-org-2064 165 17 pump pump NN blog-dshr-org-2064 165 18 - - HYPH blog-dshr-org-2064 165 19 and and CC blog-dshr-org-2064 165 20 - - HYPH blog-dshr-org-2064 165 21 dump dump NN blog-dshr-org-2064 165 22 schemes scheme NNS blog-dshr-org-2064 165 23 . . . blog-dshr-org-2064 166 1 As as IN blog-dshr-org-2064 166 2 to to IN blog-dshr-org-2064 166 3 " " `` blog-dshr-org-2064 166 4 blockchains blockchain NNS blog-dshr-org-2064 166 5 " " '' blog-dshr-org-2064 166 6 techies techie NNS blog-dshr-org-2064 166 7 are be VBP blog-dshr-org-2064 166 8 routinely routinely RB blog-dshr-org-2064 166 9 familiar familiar JJ blog-dshr-org-2064 166 10 with with IN blog-dshr-org-2064 166 11 the the DT blog-dshr-org-2064 166 12 Linux Linux NNP blog-dshr-org-2064 166 13 kernel kernel NN blog-dshr-org-2064 166 14 ' ' `` blog-dshr-org-2064 166 15 git git NN blog-dshr-org-2064 166 16 ' ' POS blog-dshr-org-2064 166 17 crypto crypto NNP blog-dshr-org-2064 166 18 blockchain blockchain NNP blog-dshr-org-2064 166 19 ledger ledger NNP blog-dshr-org-2064 166 20 , , , blog-dshr-org-2064 166 21 which which WDT blog-dshr-org-2064 166 22 was be VBD blog-dshr-org-2064 166 23 designed design VBN blog-dshr-org-2064 166 24 precisely precisely RB blog-dshr-org-2064 166 25 to to TO blog-dshr-org-2064 166 26 ensure ensure VB blog-dshr-org-2064 166 27 that that IN blog-dshr-org-2064 166 28 source source NN blog-dshr-org-2064 166 29 code code NN blog-dshr-org-2064 166 30 deposits deposit NNS blog-dshr-org-2064 166 31 and and CC blog-dshr-org-2064 166 32 withdrawals withdrawal NNS blog-dshr-org-2064 166 33 into into IN blog-dshr-org-2064 166 34 contributors contributor NNS blog-dshr-org-2064 166 35 ' ' POS blog-dshr-org-2064 166 36 accounts account NNS blog-dshr-org-2064 166 37 were be VBD blog-dshr-org-2064 166 38 cryptographically cryptographically RB blog-dshr-org-2064 166 39 secured secure VBN blog-dshr-org-2064 166 40 in in IN blog-dshr-org-2064 166 41 a a DT blog-dshr-org-2064 166 42 peer peer NN blog-dshr-org-2064 166 43 - - HYPH blog-dshr-org-2064 166 44 to to IN blog-dshr-org-2064 166 45 - - HYPH blog-dshr-org-2064 166 46 peer peer NN blog-dshr-org-2064 166 47 way way NN blog-dshr-org-2064 166 48 to to TO blog-dshr-org-2064 166 49 ensure ensure VB blog-dshr-org-2064 166 50 malicious malicious JJ blog-dshr-org-2064 166 51 servers server NNS blog-dshr-org-2064 166 52 could could MD blog-dshr-org-2064 166 53 not not RB blog-dshr-org-2064 166 54 subvert subvert VB blog-dshr-org-2064 166 55 the the DT blog-dshr-org-2064 166 56 kernel kernel NN blog-dshr-org-2064 166 57 source source NN blog-dshr-org-2064 166 58 . . . blog-dshr-org-2064 167 1 January January NNP blog-dshr-org-2064 167 2 11 11 CD blog-dshr-org-2064 167 3 , , , blog-dshr-org-2064 167 4 2018 2018 CD blog-dshr-org-2064 167 5 at at IN blog-dshr-org-2064 167 6 10:11 10:11 CD blog-dshr-org-2064 167 7 AM am NN blog-dshr-org-2064 167 8 David David NNP blog-dshr-org-2064 167 9 . . . blog-dshr-org-2064 168 1 said say VBD blog-dshr-org-2064 168 2 ... ... : blog-dshr-org-2064 169 1 One one CD blog-dshr-org-2064 169 2 - - HYPH blog-dshr-org-2064 169 3 stop stop NN blog-dshr-org-2064 169 4 counterfeit counterfeit JJ blog-dshr-org-2064 169 5 certificate certificate NN blog-dshr-org-2064 169 6 shops shop NNS blog-dshr-org-2064 169 7 for for IN blog-dshr-org-2064 169 8 all all PDT blog-dshr-org-2064 169 9 your -PRON- PRP$ blog-dshr-org-2064 169 10 malware malware NN blog-dshr-org-2064 169 11 - - HYPH blog-dshr-org-2064 169 12 signing signing NN blog-dshr-org-2064 169 13 needs need NNS blog-dshr-org-2064 169 14 by by IN blog-dshr-org-2064 169 15 Dan Dan NNP blog-dshr-org-2064 169 16 Goodin Goodin NNP blog-dshr-org-2064 169 17 is be VBZ blog-dshr-org-2064 169 18 an an DT blog-dshr-org-2064 169 19 example example NN blog-dshr-org-2064 169 20 of of IN blog-dshr-org-2064 169 21 why why WRB blog-dshr-org-2064 169 22 treating treat VBG blog-dshr-org-2064 169 23 Certificate Certificate NNP blog-dshr-org-2064 169 24 Authorities Authorities NNPS blog-dshr-org-2064 169 25 as as IN blog-dshr-org-2064 169 26 " " `` blog-dshr-org-2064 169 27 Trusted Trusted NNP blog-dshr-org-2064 169 28 Third Third NNP blog-dshr-org-2064 169 29 Parties Parties NNPS blog-dshr-org-2064 169 30 " " '' blog-dshr-org-2064 169 31 is be VBZ blog-dshr-org-2064 169 32 problematic problematic JJ blog-dshr-org-2064 169 33 : : : blog-dshr-org-2064 169 34 " " `` blog-dshr-org-2064 169 35 A a DT blog-dshr-org-2064 169 36 report report NN blog-dshr-org-2064 169 37 published publish VBN blog-dshr-org-2064 169 38 by by IN blog-dshr-org-2064 169 39 threat threat NN blog-dshr-org-2064 169 40 intelligence intelligence NN blog-dshr-org-2064 169 41 provider provider NN blog-dshr-org-2064 169 42 Recorded Recorded NNP blog-dshr-org-2064 169 43 Future Future NNP blog-dshr-org-2064 169 44 ... ... NFP blog-dshr-org-2064 169 45 identified identify VBN blog-dshr-org-2064 169 46 four four CD blog-dshr-org-2064 169 47 such such JJ blog-dshr-org-2064 169 48 sellers seller NNS blog-dshr-org-2064 169 49 of of IN blog-dshr-org-2064 169 50 counterfeit counterfeit JJ blog-dshr-org-2064 169 51 certificates certificate NNS blog-dshr-org-2064 169 52 since since IN blog-dshr-org-2064 169 53 2011 2011 CD blog-dshr-org-2064 169 54 . . . blog-dshr-org-2064 170 1 Two two CD blog-dshr-org-2064 170 2 of of IN blog-dshr-org-2064 170 3 them -PRON- PRP blog-dshr-org-2064 170 4 remain remain VBP blog-dshr-org-2064 170 5 in in IN blog-dshr-org-2064 170 6 business business NN blog-dshr-org-2064 170 7 today today NN blog-dshr-org-2064 170 8 . . . blog-dshr-org-2064 171 1 The the DT blog-dshr-org-2064 171 2 sellers seller NNS blog-dshr-org-2064 171 3 offered offer VBD blog-dshr-org-2064 171 4 a a DT blog-dshr-org-2064 171 5 variety variety NN blog-dshr-org-2064 171 6 of of IN blog-dshr-org-2064 171 7 options option NNS blog-dshr-org-2064 171 8 . . . blog-dshr-org-2064 172 1 In in IN blog-dshr-org-2064 172 2 2014 2014 CD blog-dshr-org-2064 172 3 , , , blog-dshr-org-2064 172 4 one one CD blog-dshr-org-2064 172 5 provider provider NN blog-dshr-org-2064 172 6 calling call VBG blog-dshr-org-2064 172 7 himself -PRON- PRP blog-dshr-org-2064 172 8 C@T C@T NNP blog-dshr-org-2064 172 9 advertised advertise VBD blog-dshr-org-2064 172 10 certificates certificate NNS blog-dshr-org-2064 172 11 that that WDT blog-dshr-org-2064 172 12 used use VBD blog-dshr-org-2064 172 13 a a DT blog-dshr-org-2064 172 14 Microsoft Microsoft NNP blog-dshr-org-2064 172 15 technology technology NN blog-dshr-org-2064 172 16 known know VBN blog-dshr-org-2064 172 17 as as IN blog-dshr-org-2064 172 18 Authenticode Authenticode NNP blog-dshr-org-2064 172 19 for for IN blog-dshr-org-2064 172 20 signing sign VBG blog-dshr-org-2064 172 21 executable executable JJ blog-dshr-org-2064 172 22 files file NNS blog-dshr-org-2064 172 23 and and CC blog-dshr-org-2064 172 24 programming programming NN blog-dshr-org-2064 172 25 scripts script NNS blog-dshr-org-2064 172 26 that that WDT blog-dshr-org-2064 172 27 can can MD blog-dshr-org-2064 172 28 install install VB blog-dshr-org-2064 172 29 software software NN blog-dshr-org-2064 172 30 . . . blog-dshr-org-2064 173 1 C@T C@T NNP blog-dshr-org-2064 173 2 offered offer VBD blog-dshr-org-2064 173 3 code code NN blog-dshr-org-2064 173 4 - - HYPH blog-dshr-org-2064 173 5 signing signing NN blog-dshr-org-2064 173 6 certificates certificate NNS blog-dshr-org-2064 173 7 for for IN blog-dshr-org-2064 173 8 macOS macos NN blog-dshr-org-2064 173 9 apps app NNS blog-dshr-org-2064 173 10 as as RB blog-dshr-org-2064 173 11 well well RB blog-dshr-org-2064 173 12 . . . blog-dshr-org-2064 174 1 His -PRON- PRP$ blog-dshr-org-2064 174 2 fee fee NN blog-dshr-org-2064 174 3 : : : blog-dshr-org-2064 174 4 upwards upward NNS blog-dshr-org-2064 174 5 of of IN blog-dshr-org-2064 174 6 $ $ $ blog-dshr-org-2064 174 7 1,000 1,000 CD blog-dshr-org-2064 174 8 per per IN blog-dshr-org-2064 174 9 certificate certificate NN blog-dshr-org-2064 174 10 . . . blog-dshr-org-2064 174 11 " " '' blog-dshr-org-2064 175 1 Note note VB blog-dshr-org-2064 175 2 that that IN blog-dshr-org-2064 175 3 these these DT blog-dshr-org-2064 175 4 certificates certificate NNS blog-dshr-org-2064 175 5 are be VBP blog-dshr-org-2064 175 6 not not RB blog-dshr-org-2064 175 7 counterfeit counterfeit JJ blog-dshr-org-2064 175 8 , , , blog-dshr-org-2064 175 9 they -PRON- PRP blog-dshr-org-2064 175 10 are be VBP blog-dshr-org-2064 175 11 real real JJ blog-dshr-org-2064 175 12 certificates certificate NNS blog-dshr-org-2064 175 13 " " '' blog-dshr-org-2064 175 14 registered register VBN blog-dshr-org-2064 175 15 under under IN blog-dshr-org-2064 175 16 legitimate legitimate JJ blog-dshr-org-2064 175 17 corporations corporation NNS blog-dshr-org-2064 175 18 and and CC blog-dshr-org-2064 175 19 issued issue VBN blog-dshr-org-2064 175 20 by by IN blog-dshr-org-2064 175 21 Comodo Comodo NNP blog-dshr-org-2064 175 22 , , , blog-dshr-org-2064 175 23 Thawte Thawte NNP blog-dshr-org-2064 175 24 , , , blog-dshr-org-2064 175 25 and and CC blog-dshr-org-2064 175 26 Symantec Symantec NNP blog-dshr-org-2064 175 27 — — : blog-dshr-org-2064 175 28 the the DT blog-dshr-org-2064 175 29 largest large JJS blog-dshr-org-2064 175 30 and and CC blog-dshr-org-2064 175 31 most most RBS blog-dshr-org-2064 175 32 respected respected JJ blog-dshr-org-2064 175 33 issuers issuer NNS blog-dshr-org-2064 175 34 " " '' blog-dshr-org-2064 175 35 . . . blog-dshr-org-2064 176 1 They -PRON- PRP blog-dshr-org-2064 176 2 are be VBP blog-dshr-org-2064 176 3 the the DT blog-dshr-org-2064 176 4 result result NN blog-dshr-org-2064 176 5 of of IN blog-dshr-org-2064 176 6 corporate corporate JJ blog-dshr-org-2064 176 7 identity identity NN blog-dshr-org-2064 176 8 theft theft NN blog-dshr-org-2064 176 9 and and CC blog-dshr-org-2064 176 10 failures failure NNS blog-dshr-org-2064 176 11 of of IN blog-dshr-org-2064 176 12 the the DT blog-dshr-org-2064 176 13 verification verification NN blog-dshr-org-2064 176 14 processes process NNS blog-dshr-org-2064 176 15 of of IN blog-dshr-org-2064 176 16 the the DT blog-dshr-org-2064 176 17 issuers issuer NNS blog-dshr-org-2064 176 18 . . . blog-dshr-org-2064 177 1 February February NNP blog-dshr-org-2064 177 2 22 22 CD blog-dshr-org-2064 177 3 , , , blog-dshr-org-2064 177 4 2018 2018 CD blog-dshr-org-2064 177 5 at at IN blog-dshr-org-2064 177 6 9:47 9:47 CD blog-dshr-org-2064 177 7 AM am NN blog-dshr-org-2064 177 8 David David NNP blog-dshr-org-2064 177 9 . . . blog-dshr-org-2064 178 1 said say VBD blog-dshr-org-2064 178 2 ... ... : blog-dshr-org-2064 178 3 " " `` blog-dshr-org-2064 178 4 Over over IN blog-dshr-org-2064 178 5 23,000 23,000 CD blog-dshr-org-2064 178 6 users user NNS blog-dshr-org-2064 178 7 will will MD blog-dshr-org-2064 178 8 have have VB blog-dshr-org-2064 178 9 their -PRON- PRP$ blog-dshr-org-2064 178 10 SSL ssl NN blog-dshr-org-2064 178 11 certificates certificate NNS blog-dshr-org-2064 178 12 revoked revoke VBN blog-dshr-org-2064 178 13 by by IN blog-dshr-org-2064 178 14 tomorrow tomorrow NN blog-dshr-org-2064 178 15 morning morning NN blog-dshr-org-2064 178 16 , , , blog-dshr-org-2064 178 17 March March NNP blog-dshr-org-2064 178 18 1 1 CD blog-dshr-org-2064 178 19 , , , blog-dshr-org-2064 178 20 in in IN blog-dshr-org-2064 178 21 an an DT blog-dshr-org-2064 178 22 incident incident NN blog-dshr-org-2064 178 23 between between IN blog-dshr-org-2064 178 24 two two CD blog-dshr-org-2064 178 25 companies company NNS blog-dshr-org-2064 178 26 — — : blog-dshr-org-2064 178 27 Trustico Trustico NNP blog-dshr-org-2064 178 28 and and CC blog-dshr-org-2064 178 29 DigiCert DigiCert NNP blog-dshr-org-2064 178 30 — — : blog-dshr-org-2064 178 31 that that WDT blog-dshr-org-2064 178 32 is be VBZ blog-dshr-org-2064 178 33 likely likely JJ blog-dshr-org-2064 178 34 to to TO blog-dshr-org-2064 178 35 have have VB blog-dshr-org-2064 178 36 a a DT blog-dshr-org-2064 178 37 huge huge JJ blog-dshr-org-2064 178 38 impact impact NN blog-dshr-org-2064 178 39 on on IN blog-dshr-org-2064 178 40 the the DT blog-dshr-org-2064 178 41 CA CA NNP blog-dshr-org-2064 178 42 ( ( -LRB- blog-dshr-org-2064 178 43 Certificate Certificate NNP blog-dshr-org-2064 178 44 Authority Authority NNP blog-dshr-org-2064 178 45 ) ) -RRB- blog-dshr-org-2064 178 46 industry industry NN blog-dshr-org-2064 178 47 as as IN blog-dshr-org-2064 178 48 a a DT blog-dshr-org-2064 178 49 whole whole NN blog-dshr-org-2064 178 50 in in IN blog-dshr-org-2064 178 51 the the DT blog-dshr-org-2064 178 52 coming coming JJ blog-dshr-org-2064 178 53 months month NNS blog-dshr-org-2064 178 54 . . . blog-dshr-org-2064 178 55 " " '' blog-dshr-org-2064 179 1 is be VBZ blog-dshr-org-2064 179 2 the the DT blog-dshr-org-2064 179 3 start start NN blog-dshr-org-2064 179 4 of of IN blog-dshr-org-2064 179 5 a a DT blog-dshr-org-2064 179 6 Catalin Catalin NNP blog-dshr-org-2064 179 7 Cimpanu Cimpanu NNP blog-dshr-org-2064 179 8 post post NN blog-dshr-org-2064 179 9 . . . blog-dshr-org-2064 180 1 It -PRON- PRP blog-dshr-org-2064 180 2 is be VBZ blog-dshr-org-2064 180 3 a a DT blog-dshr-org-2064 180 4 complicated complicated JJ blog-dshr-org-2064 180 5 story story NN blog-dshr-org-2064 180 6 of of IN blog-dshr-org-2064 180 7 Certificate Certificate NNP blog-dshr-org-2064 180 8 Authorities Authorities NNPS blog-dshr-org-2064 180 9 behaving behave VBG blog-dshr-org-2064 180 10 badly badly RB blog-dshr-org-2064 180 11 ( ( -LRB- blog-dshr-org-2064 180 12 who who WP blog-dshr-org-2064 180 13 could could MD blog-dshr-org-2064 180 14 have have VB blog-dshr-org-2064 180 15 imagined imagine VBN blog-dshr-org-2064 180 16 ? ? . blog-dshr-org-2064 180 17 ) ) -RRB- blog-dshr-org-2064 180 18 . . . blog-dshr-org-2064 181 1 Cimpanu Cimpanu NNP blog-dshr-org-2064 181 2 has have VBZ blog-dshr-org-2064 181 3 a a DT blog-dshr-org-2064 181 4 useful useful JJ blog-dshr-org-2064 181 5 timeline timeline NN blog-dshr-org-2064 181 6 . . . blog-dshr-org-2064 182 1 The the DT blog-dshr-org-2064 182 2 gist gist NN blog-dshr-org-2064 182 3 is be VBZ blog-dshr-org-2064 182 4 that that IN blog-dshr-org-2064 182 5 Trustico Trustico NNP blog-dshr-org-2064 182 6 used use VBD blog-dshr-org-2064 182 7 to to TO blog-dshr-org-2064 182 8 resell resell VB blog-dshr-org-2064 182 9 certificates certificate NNS blog-dshr-org-2064 182 10 from from IN blog-dshr-org-2064 182 11 DigiCert DigiCert NNP blog-dshr-org-2064 182 12 but but CC blog-dshr-org-2064 182 13 was be VBD blog-dshr-org-2064 182 14 switching switch VBG blog-dshr-org-2064 182 15 to to IN blog-dshr-org-2064 182 16 resell resell VB blog-dshr-org-2064 182 17 certificates certificate NNS blog-dshr-org-2064 182 18 from from IN blog-dshr-org-2064 182 19 Comodo Comodo NNP blog-dshr-org-2064 182 20 . . . blog-dshr-org-2064 183 1 During during IN blog-dshr-org-2064 183 2 this this DT blog-dshr-org-2064 183 3 spat spat NN blog-dshr-org-2064 183 4 with with IN blog-dshr-org-2064 183 5 DigiCert DigiCert NNP blog-dshr-org-2064 183 6 , , , blog-dshr-org-2064 183 7 it -PRON- PRP blog-dshr-org-2064 183 8 became become VBD blog-dshr-org-2064 183 9 obvious obvious JJ blog-dshr-org-2064 183 10 that that IN blog-dshr-org-2064 183 11 : : : blog-dshr-org-2064 183 12 A a DT blog-dshr-org-2064 183 13 ) ) -RRB- blog-dshr-org-2064 183 14 Trustico Trustico NNP blog-dshr-org-2064 183 15 's 's POS blog-dshr-org-2064 183 16 on on IN blog-dshr-org-2064 183 17 - - HYPH blog-dshr-org-2064 183 18 line line NN blog-dshr-org-2064 183 19 certificate certificate NN blog-dshr-org-2064 183 20 generation generation NN blog-dshr-org-2064 183 21 process process NN blog-dshr-org-2064 183 22 captured capture VBN blog-dshr-org-2064 183 23 and and CC blog-dshr-org-2064 183 24 stored store VBD blog-dshr-org-2064 183 25 the the DT blog-dshr-org-2064 183 26 user user NN blog-dshr-org-2064 183 27 's 's POS blog-dshr-org-2064 183 28 private private JJ blog-dshr-org-2064 183 29 keys key NNS blog-dshr-org-2064 183 30 , , , blog-dshr-org-2064 183 31 which which WDT blog-dshr-org-2064 183 32 is be VBZ blog-dshr-org-2064 183 33 a a DT blog-dshr-org-2064 183 34 complete complete JJ blog-dshr-org-2064 183 35 no no DT blog-dshr-org-2064 183 36 - - HYPH blog-dshr-org-2064 183 37 no no NN blog-dshr-org-2064 183 38 . . . blog-dshr-org-2064 184 1 Dan Dan NNP blog-dshr-org-2064 184 2 Goodin Goodin NNP blog-dshr-org-2064 184 3 writes write VBZ blog-dshr-org-2064 184 4 : : : blog-dshr-org-2064 184 5 " " `` blog-dshr-org-2064 184 6 private private JJ blog-dshr-org-2064 184 7 keys key NNS blog-dshr-org-2064 184 8 for for IN blog-dshr-org-2064 184 9 TLS TLS NNP blog-dshr-org-2064 184 10 certificates certificate NNS blog-dshr-org-2064 184 11 should should MD blog-dshr-org-2064 184 12 never never RB blog-dshr-org-2064 184 13 be be VB blog-dshr-org-2064 184 14 archived archive VBN blog-dshr-org-2064 184 15 by by IN blog-dshr-org-2064 184 16 resellers reseller NNS blog-dshr-org-2064 184 17 , , , blog-dshr-org-2064 184 18 and and CC blog-dshr-org-2064 184 19 , , , blog-dshr-org-2064 184 20 even even RB blog-dshr-org-2064 184 21 in in IN blog-dshr-org-2064 184 22 the the DT blog-dshr-org-2064 184 23 rare rare JJ blog-dshr-org-2064 184 24 cases case NNS blog-dshr-org-2064 184 25 where where WRB blog-dshr-org-2064 184 26 such such JJ blog-dshr-org-2064 184 27 storage storage NN blog-dshr-org-2064 184 28 is be VBZ blog-dshr-org-2064 184 29 permissible permissible JJ blog-dshr-org-2064 184 30 , , , blog-dshr-org-2064 184 31 they -PRON- PRP blog-dshr-org-2064 184 32 should should MD blog-dshr-org-2064 184 33 be be VB blog-dshr-org-2064 184 34 tightly tightly RB blog-dshr-org-2064 184 35 safeguarded safeguard VBN blog-dshr-org-2064 184 36 . . . blog-dshr-org-2064 185 1 A a DT blog-dshr-org-2064 185 2 CEO ceo NN blog-dshr-org-2064 185 3 being be VBG blog-dshr-org-2064 185 4 able able JJ blog-dshr-org-2064 185 5 to to TO blog-dshr-org-2064 185 6 attach attach VB blog-dshr-org-2064 185 7 the the DT blog-dshr-org-2064 185 8 keys key NNS blog-dshr-org-2064 185 9 for for IN blog-dshr-org-2064 185 10 23,000 23,000 CD blog-dshr-org-2064 185 11 certificates certificate NNS blog-dshr-org-2064 185 12 to to IN blog-dshr-org-2064 185 13 an an DT blog-dshr-org-2064 185 14 email email NN blog-dshr-org-2064 185 15 raises raise VBZ blog-dshr-org-2064 185 16 troubling troubling JJ blog-dshr-org-2064 185 17 concerns concern NNS blog-dshr-org-2064 185 18 that that IN blog-dshr-org-2064 185 19 those those DT blog-dshr-org-2064 185 20 types type NNS blog-dshr-org-2064 185 21 of of IN blog-dshr-org-2064 185 22 best good JJS blog-dshr-org-2064 185 23 practices practice NNS blog-dshr-org-2064 185 24 were be VBD blog-dshr-org-2064 185 25 n't not RB blog-dshr-org-2064 185 26 followed follow VBN blog-dshr-org-2064 185 27 . . . blog-dshr-org-2064 186 1 ( ( -LRB- blog-dshr-org-2064 186 2 There there EX blog-dshr-org-2064 186 3 's be VBZ blog-dshr-org-2064 186 4 no no DT blog-dshr-org-2064 186 5 indication indication NN blog-dshr-org-2064 186 6 the the DT blog-dshr-org-2064 186 7 email email NN blog-dshr-org-2064 186 8 was be VBD blog-dshr-org-2064 186 9 encrypted encrypt VBN blog-dshr-org-2064 186 10 , , , blog-dshr-org-2064 186 11 either either RB blog-dshr-org-2064 186 12 , , , blog-dshr-org-2064 186 13 although although IN blog-dshr-org-2064 186 14 neither neither DT blog-dshr-org-2064 186 15 Trustico Trustico NNP blog-dshr-org-2064 186 16 nor nor CC blog-dshr-org-2064 186 17 DigiCert DigiCert NNP blog-dshr-org-2064 186 18 provided provide VBD blog-dshr-org-2064 186 19 that that DT blog-dshr-org-2064 186 20 detail detail NN blog-dshr-org-2064 186 21 when when WRB blog-dshr-org-2064 186 22 responding respond VBG blog-dshr-org-2064 186 23 to to IN blog-dshr-org-2064 186 24 questions question NNS blog-dshr-org-2064 186 25 . . . blog-dshr-org-2064 186 26 ) ) -RRB- blog-dshr-org-2064 186 27 " " '' blog-dshr-org-2064 187 1 B b NN blog-dshr-org-2064 187 2 ) ) -RRB- blog-dshr-org-2064 187 3 Trustico Trustico NNP blog-dshr-org-2064 187 4 's 's POS blog-dshr-org-2064 187 5 approach approach NN blog-dshr-org-2064 187 6 to to TO blog-dshr-org-2064 187 7 website website VB blog-dshr-org-2064 187 8 security security NN blog-dshr-org-2064 187 9 was be VBD blog-dshr-org-2064 187 10 inadequate inadequate JJ blog-dshr-org-2064 187 11 . . . blog-dshr-org-2064 188 1 They -PRON- PRP blog-dshr-org-2064 188 2 had have VBD blog-dshr-org-2064 188 3 to to TO blog-dshr-org-2064 188 4 take take VB blog-dshr-org-2064 188 5 their -PRON- PRP$ blog-dshr-org-2064 188 6 website website NN blog-dshr-org-2064 188 7 down down RP blog-dshr-org-2064 188 8 : : : blog-dshr-org-2064 188 9 " " `` blog-dshr-org-2064 188 10 shortly shortly RB blog-dshr-org-2064 188 11 after after IN blog-dshr-org-2064 188 12 a a DT blog-dshr-org-2064 188 13 website website NN blog-dshr-org-2064 188 14 security security NN blog-dshr-org-2064 188 15 expert expert NN blog-dshr-org-2064 188 16 disclosed disclose VBD blog-dshr-org-2064 188 17 a a DT blog-dshr-org-2064 188 18 critical critical JJ blog-dshr-org-2064 188 19 vulnerability vulnerability NN blog-dshr-org-2064 188 20 on on IN blog-dshr-org-2064 188 21 Twitter Twitter NNP blog-dshr-org-2064 188 22 that that WDT blog-dshr-org-2064 188 23 appeared appear VBD blog-dshr-org-2064 188 24 to to TO blog-dshr-org-2064 188 25 make make VB blog-dshr-org-2064 188 26 it -PRON- PRP blog-dshr-org-2064 188 27 possible possible JJ blog-dshr-org-2064 188 28 for for IN blog-dshr-org-2064 188 29 outsiders outsider NNS blog-dshr-org-2064 188 30 to to TO blog-dshr-org-2064 188 31 run run VB blog-dshr-org-2064 188 32 malicious malicious JJ blog-dshr-org-2064 188 33 code code NN blog-dshr-org-2064 188 34 on on IN blog-dshr-org-2064 188 35 Trustico Trustico NNP blog-dshr-org-2064 188 36 servers server NNS blog-dshr-org-2064 188 37 . . . blog-dshr-org-2064 189 1 The the DT blog-dshr-org-2064 189 2 vulnerability vulnerability NN blog-dshr-org-2064 189 3 , , , blog-dshr-org-2064 189 4 in in IN blog-dshr-org-2064 189 5 a a DT blog-dshr-org-2064 189 6 trustico.com trustico.com NNP blog-dshr-org-2064 189 7 website website NN blog-dshr-org-2064 189 8 feature feature NN blog-dshr-org-2064 189 9 that that WDT blog-dshr-org-2064 189 10 allowed allow VBD blog-dshr-org-2064 189 11 customers customer NNS blog-dshr-org-2064 189 12 to to TO blog-dshr-org-2064 189 13 confirm confirm VB blog-dshr-org-2064 189 14 certificates certificate NNS blog-dshr-org-2064 189 15 were be VBD blog-dshr-org-2064 189 16 properly properly RB blog-dshr-org-2064 189 17 installed instal VBN blog-dshr-org-2064 189 18 on on IN blog-dshr-org-2064 189 19 their -PRON- PRP$ blog-dshr-org-2064 189 20 sites site NNS blog-dshr-org-2064 189 21 , , , blog-dshr-org-2064 189 22 appeared appear VBD blog-dshr-org-2064 189 23 to to TO blog-dshr-org-2064 189 24 run run VB blog-dshr-org-2064 189 25 as as IN blog-dshr-org-2064 189 26 root root NN blog-dshr-org-2064 189 27 . . . blog-dshr-org-2064 190 1 By by IN blog-dshr-org-2064 190 2 inserting insert VBG blog-dshr-org-2064 190 3 commands command NNS blog-dshr-org-2064 190 4 into into IN blog-dshr-org-2064 190 5 the the DT blog-dshr-org-2064 190 6 validation validation NN blog-dshr-org-2064 190 7 form form NN blog-dshr-org-2064 190 8 , , , blog-dshr-org-2064 190 9 attackers attacker NNS blog-dshr-org-2064 190 10 could could MD blog-dshr-org-2064 190 11 call call VB blog-dshr-org-2064 190 12 code code NN blog-dshr-org-2064 190 13 of of IN blog-dshr-org-2064 190 14 their -PRON- PRP$ blog-dshr-org-2064 190 15 choice choice NN blog-dshr-org-2064 190 16 and and CC blog-dshr-org-2064 190 17 get get VB blog-dshr-org-2064 190 18 it -PRON- PRP blog-dshr-org-2064 190 19 to to TO blog-dshr-org-2064 190 20 run run VB blog-dshr-org-2064 190 21 on on IN blog-dshr-org-2064 190 22 Trustico Trustico NNP blog-dshr-org-2064 190 23 servers server NNS blog-dshr-org-2064 190 24 with with IN blog-dshr-org-2064 190 25 unfettered unfettered JJ blog-dshr-org-2064 190 26 " " `` blog-dshr-org-2064 190 27 root root NN blog-dshr-org-2064 190 28 " " '' blog-dshr-org-2064 190 29 privileges privilege NNS blog-dshr-org-2064 190 30 , , , blog-dshr-org-2064 190 31 the the DT blog-dshr-org-2064 190 32 tweet tweet NN blog-dshr-org-2064 190 33 indicated indicate VBD blog-dshr-org-2064 190 34 . . . blog-dshr-org-2064 190 35 " " '' blog-dshr-org-2064 191 1 March March NNP blog-dshr-org-2064 191 2 4 4 CD blog-dshr-org-2064 191 3 , , , blog-dshr-org-2064 191 4 2018 2018 CD blog-dshr-org-2064 191 5 at at IN blog-dshr-org-2064 191 6 10:05 10:05 CD blog-dshr-org-2064 191 7 AM am NN blog-dshr-org-2064 191 8 Post Post NNP blog-dshr-org-2064 191 9 a a DT blog-dshr-org-2064 191 10 Comment Comment NNP blog-dshr-org-2064 191 11 Newer Newer NNP blog-dshr-org-2064 191 12 Post Post NNP blog-dshr-org-2064 191 13 Older Older NNP blog-dshr-org-2064 191 14 Post Post NNP blog-dshr-org-2064 191 15 Home Home NNP blog-dshr-org-2064 191 16 Subscribe Subscribe NNP blog-dshr-org-2064 191 17 to to TO blog-dshr-org-2064 191 18 : : : blog-dshr-org-2064 191 19 Post Post NNP blog-dshr-org-2064 191 20 Comments comment NNS blog-dshr-org-2064 191 21 ( ( -LRB- blog-dshr-org-2064 191 22 Atom atom NN blog-dshr-org-2064 191 23 ) ) -RRB- blog-dshr-org-2064 191 24 Blog Blog NNP blog-dshr-org-2064 191 25 Rules rule NNS blog-dshr-org-2064 191 26 Posts post NNS blog-dshr-org-2064 191 27 and and CC blog-dshr-org-2064 191 28 comments comment NNS blog-dshr-org-2064 191 29 are be VBP blog-dshr-org-2064 191 30 copyright copyright NN blog-dshr-org-2064 191 31 of of IN blog-dshr-org-2064 191 32 their -PRON- PRP$ blog-dshr-org-2064 191 33 respective respective JJ blog-dshr-org-2064 191 34 authors author NNS blog-dshr-org-2064 191 35 who who WP blog-dshr-org-2064 191 36 , , , blog-dshr-org-2064 191 37 by by IN blog-dshr-org-2064 191 38 posting post VBG blog-dshr-org-2064 191 39 or or CC blog-dshr-org-2064 191 40 commenting comment VBG blog-dshr-org-2064 191 41 , , , blog-dshr-org-2064 191 42 license license VBP blog-dshr-org-2064 191 43 their -PRON- PRP$ blog-dshr-org-2064 191 44 work work NN blog-dshr-org-2064 191 45 under under IN blog-dshr-org-2064 191 46 a a DT blog-dshr-org-2064 191 47 Creative Creative NNP blog-dshr-org-2064 191 48 Commons Commons NNP blog-dshr-org-2064 191 49 Attribution Attribution NNP blog-dshr-org-2064 191 50 - - HYPH blog-dshr-org-2064 191 51 Share Share NNP blog-dshr-org-2064 191 52 Alike alike RB blog-dshr-org-2064 191 53 3.0 3.0 CD blog-dshr-org-2064 191 54 United United NNP blog-dshr-org-2064 191 55 States States NNP blog-dshr-org-2064 191 56 License License NNP blog-dshr-org-2064 191 57 . . . blog-dshr-org-2064 192 1 Off off IN blog-dshr-org-2064 192 2 - - HYPH blog-dshr-org-2064 192 3 topic topic NN blog-dshr-org-2064 192 4 or or CC blog-dshr-org-2064 192 5 unsuitable unsuitable JJ blog-dshr-org-2064 192 6 comments comment NNS blog-dshr-org-2064 192 7 will will MD blog-dshr-org-2064 192 8 be be VB blog-dshr-org-2064 192 9 deleted delete VBN blog-dshr-org-2064 192 10 . . . blog-dshr-org-2064 193 1 DSHR DSHR NNP blog-dshr-org-2064 193 2 DSHR DSHR NNP blog-dshr-org-2064 193 3 in in IN blog-dshr-org-2064 193 4 ANWR ANWR NNP blog-dshr-org-2064 193 5 Recent recent JJ blog-dshr-org-2064 193 6 Comments comment NNS blog-dshr-org-2064 193 7 Full full JJ blog-dshr-org-2064 193 8 comments comment NNS blog-dshr-org-2064 193 9 Blog Blog NNP blog-dshr-org-2064 193 10 Archive Archive NNP blog-dshr-org-2064 193 11 ► ► NFP blog-dshr-org-2064 193 12     _SP blog-dshr-org-2064 193 13 2021 2021 CD blog-dshr-org-2064 193 14 ( ( -LRB- blog-dshr-org-2064 193 15 39 39 CD blog-dshr-org-2064 193 16 ) ) -RRB- blog-dshr-org-2064 193 17 ► ► NFP blog-dshr-org-2064 193 18     _SP blog-dshr-org-2064 193 19 August August NNP blog-dshr-org-2064 193 20 ( ( -LRB- blog-dshr-org-2064 193 21 2 2 CD blog-dshr-org-2064 193 22 ) ) -RRB- blog-dshr-org-2064 193 23 ► ► NFP blog-dshr-org-2064 193 24     _SP blog-dshr-org-2064 193 25 July July NNP blog-dshr-org-2064 193 26 ( ( -LRB- blog-dshr-org-2064 193 27 6 6 CD blog-dshr-org-2064 193 28 ) ) -RRB- blog-dshr-org-2064 193 29 ► ► NFP blog-dshr-org-2064 193 30     _SP blog-dshr-org-2064 193 31 June June NNP blog-dshr-org-2064 193 32 ( ( -LRB- blog-dshr-org-2064 193 33 8) 8) CD blog-dshr-org-2064 193 34 ► ► CD blog-dshr-org-2064 193 35     _SP blog-dshr-org-2064 193 36 May May NNP blog-dshr-org-2064 193 37 ( ( -LRB- blog-dshr-org-2064 193 38 4 4 CD blog-dshr-org-2064 193 39 ) ) -RRB- blog-dshr-org-2064 193 40 ► ► NFP blog-dshr-org-2064 193 41     _SP blog-dshr-org-2064 193 42 April April NNP blog-dshr-org-2064 193 43 ( ( -LRB- blog-dshr-org-2064 193 44 6 6 CD blog-dshr-org-2064 193 45 ) ) -RRB- blog-dshr-org-2064 193 46 ► ► NFP blog-dshr-org-2064 193 47     _SP blog-dshr-org-2064 193 48 March March NNP blog-dshr-org-2064 193 49 ( ( -LRB- blog-dshr-org-2064 193 50 3 3 CD blog-dshr-org-2064 193 51 ) ) -RRB- blog-dshr-org-2064 193 52 ► ► NFP blog-dshr-org-2064 193 53     _SP blog-dshr-org-2064 193 54 February February NNP blog-dshr-org-2064 193 55 ( ( -LRB- blog-dshr-org-2064 193 56 5 5 CD blog-dshr-org-2064 193 57 ) ) -RRB- blog-dshr-org-2064 193 58 ► ► NFP blog-dshr-org-2064 193 59     _SP blog-dshr-org-2064 193 60 January January NNP blog-dshr-org-2064 193 61 ( ( -LRB- blog-dshr-org-2064 193 62 5 5 CD blog-dshr-org-2064 193 63 ) ) -RRB- blog-dshr-org-2064 193 64 ► ► CD blog-dshr-org-2064 193 65     _SP blog-dshr-org-2064 193 66 2020 2020 CD blog-dshr-org-2064 193 67 ( ( -LRB- blog-dshr-org-2064 193 68 55 55 CD blog-dshr-org-2064 193 69 ) ) -RRB- blog-dshr-org-2064 193 70 ► ► NFP blog-dshr-org-2064 193 71     _SP blog-dshr-org-2064 193 72 December December NNP blog-dshr-org-2064 193 73 ( ( -LRB- blog-dshr-org-2064 193 74 4 4 CD blog-dshr-org-2064 193 75 ) ) -RRB- blog-dshr-org-2064 193 76 ► ► NFP blog-dshr-org-2064 193 77     _SP blog-dshr-org-2064 193 78 November November NNP blog-dshr-org-2064 193 79 ( ( -LRB- blog-dshr-org-2064 193 80 4 4 CD blog-dshr-org-2064 193 81 ) ) -RRB- blog-dshr-org-2064 193 82 ► ► NFP blog-dshr-org-2064 193 83     _SP blog-dshr-org-2064 193 84 October October NNP blog-dshr-org-2064 193 85 ( ( -LRB- blog-dshr-org-2064 193 86 3 3 CD blog-dshr-org-2064 193 87 ) ) -RRB- blog-dshr-org-2064 193 88 ► ► NFP blog-dshr-org-2064 193 89     _SP blog-dshr-org-2064 193 90 September September NNP blog-dshr-org-2064 193 91 ( ( -LRB- blog-dshr-org-2064 193 92 6 6 CD blog-dshr-org-2064 193 93 ) ) -RRB- blog-dshr-org-2064 193 94 ► ► NFP blog-dshr-org-2064 193 95     _SP blog-dshr-org-2064 193 96 August August NNP blog-dshr-org-2064 193 97 ( ( -LRB- blog-dshr-org-2064 193 98 5 5 CD blog-dshr-org-2064 193 99 ) ) -RRB- blog-dshr-org-2064 193 100 ► ► NFP blog-dshr-org-2064 193 101     _SP blog-dshr-org-2064 193 102 July July NNP blog-dshr-org-2064 193 103 ( ( -LRB- blog-dshr-org-2064 193 104 3 3 CD blog-dshr-org-2064 193 105 ) ) -RRB- blog-dshr-org-2064 193 106 ► ► NFP blog-dshr-org-2064 193 107     _SP blog-dshr-org-2064 193 108 June June NNP blog-dshr-org-2064 193 109 ( ( -LRB- blog-dshr-org-2064 193 110 6 6 CD blog-dshr-org-2064 193 111 ) ) -RRB- blog-dshr-org-2064 193 112 ► ► NFP blog-dshr-org-2064 193 113     _SP blog-dshr-org-2064 193 114 May May NNP blog-dshr-org-2064 193 115 ( ( -LRB- blog-dshr-org-2064 193 116 3 3 CD blog-dshr-org-2064 193 117 ) ) -RRB- blog-dshr-org-2064 193 118 ► ► NFP blog-dshr-org-2064 193 119     _SP blog-dshr-org-2064 193 120 April April NNP blog-dshr-org-2064 193 121 ( ( -LRB- blog-dshr-org-2064 193 122 5 5 CD blog-dshr-org-2064 193 123 ) ) -RRB- blog-dshr-org-2064 193 124 ► ► NFP blog-dshr-org-2064 193 125     _SP blog-dshr-org-2064 193 126 March March NNP blog-dshr-org-2064 193 127 ( ( -LRB- blog-dshr-org-2064 193 128 6 6 CD blog-dshr-org-2064 193 129 ) ) -RRB- blog-dshr-org-2064 193 130 ► ► NFP blog-dshr-org-2064 193 131     _SP blog-dshr-org-2064 193 132 February February NNP blog-dshr-org-2064 193 133 ( ( -LRB- blog-dshr-org-2064 193 134 5 5 CD blog-dshr-org-2064 193 135 ) ) -RRB- blog-dshr-org-2064 193 136 ► ► NFP blog-dshr-org-2064 193 137     _SP blog-dshr-org-2064 193 138 January January NNP blog-dshr-org-2064 193 139 ( ( -LRB- blog-dshr-org-2064 193 140 5 5 CD blog-dshr-org-2064 193 141 ) ) -RRB- blog-dshr-org-2064 193 142 ► ► CD blog-dshr-org-2064 193 143     _SP blog-dshr-org-2064 193 144 2019 2019 CD blog-dshr-org-2064 193 145 ( ( -LRB- blog-dshr-org-2064 193 146 66 66 CD blog-dshr-org-2064 193 147 ) ) -RRB- blog-dshr-org-2064 193 148 ► ► NFP blog-dshr-org-2064 193 149     _SP blog-dshr-org-2064 193 150 December December NNP blog-dshr-org-2064 193 151 ( ( -LRB- blog-dshr-org-2064 193 152 2 2 CD blog-dshr-org-2064 193 153 ) ) -RRB- blog-dshr-org-2064 193 154 ► ► NFP blog-dshr-org-2064 193 155     _SP blog-dshr-org-2064 193 156 November November NNP blog-dshr-org-2064 193 157 ( ( -LRB- blog-dshr-org-2064 193 158 4 4 CD blog-dshr-org-2064 193 159 ) ) -RRB- blog-dshr-org-2064 193 160 ► ► NFP blog-dshr-org-2064 193 161     _SP blog-dshr-org-2064 193 162 October October NNP blog-dshr-org-2064 193 163 ( ( -LRB- blog-dshr-org-2064 193 164 8) 8) CD blog-dshr-org-2064 193 165 ► ► CD blog-dshr-org-2064 193 166     _SP blog-dshr-org-2064 193 167 September September NNP blog-dshr-org-2064 193 168 ( ( -LRB- blog-dshr-org-2064 193 169 5 5 CD blog-dshr-org-2064 193 170 ) ) -RRB- blog-dshr-org-2064 193 171 ► ► NFP blog-dshr-org-2064 193 172     _SP blog-dshr-org-2064 193 173 August August NNP blog-dshr-org-2064 193 174 ( ( -LRB- blog-dshr-org-2064 193 175 5 5 CD blog-dshr-org-2064 193 176 ) ) -RRB- blog-dshr-org-2064 193 177 ► ► NFP blog-dshr-org-2064 193 178     _SP blog-dshr-org-2064 193 179 July July NNP blog-dshr-org-2064 193 180 ( ( -LRB- blog-dshr-org-2064 193 181 7 7 CD blog-dshr-org-2064 193 182 ) ) -RRB- blog-dshr-org-2064 193 183 ► ► NFP blog-dshr-org-2064 193 184     _SP blog-dshr-org-2064 193 185 June June NNP blog-dshr-org-2064 193 186 ( ( -LRB- blog-dshr-org-2064 193 187 6 6 CD blog-dshr-org-2064 193 188 ) ) -RRB- blog-dshr-org-2064 193 189 ► ► NFP blog-dshr-org-2064 193 190     _SP blog-dshr-org-2064 193 191 May May NNP blog-dshr-org-2064 193 192 ( ( -LRB- blog-dshr-org-2064 193 193 7 7 CD blog-dshr-org-2064 193 194 ) ) -RRB- blog-dshr-org-2064 193 195 ► ► NFP blog-dshr-org-2064 193 196     _SP blog-dshr-org-2064 193 197 April April NNP blog-dshr-org-2064 193 198 ( ( -LRB- blog-dshr-org-2064 193 199 6 6 CD blog-dshr-org-2064 193 200 ) ) -RRB- blog-dshr-org-2064 193 201 ► ► NFP blog-dshr-org-2064 193 202     _SP blog-dshr-org-2064 193 203 March March NNP blog-dshr-org-2064 193 204 ( ( -LRB- blog-dshr-org-2064 193 205 7 7 CD blog-dshr-org-2064 193 206 ) ) -RRB- blog-dshr-org-2064 193 207 ► ► NFP blog-dshr-org-2064 193 208     _SP blog-dshr-org-2064 193 209 February February NNP blog-dshr-org-2064 193 210 ( ( -LRB- blog-dshr-org-2064 193 211 4 4 CD blog-dshr-org-2064 193 212 ) ) -RRB- blog-dshr-org-2064 193 213 ► ► NFP blog-dshr-org-2064 193 214     _SP blog-dshr-org-2064 193 215 January January NNP blog-dshr-org-2064 193 216 ( ( -LRB- blog-dshr-org-2064 193 217 5 5 CD blog-dshr-org-2064 193 218 ) ) -RRB- blog-dshr-org-2064 193 219 ► ► CD blog-dshr-org-2064 193 220     _SP blog-dshr-org-2064 193 221 2018 2018 CD blog-dshr-org-2064 193 222 ( ( -LRB- blog-dshr-org-2064 193 223 96 96 CD blog-dshr-org-2064 193 224 ) ) -RRB- blog-dshr-org-2064 193 225 ► ► NFP blog-dshr-org-2064 193 226     _SP blog-dshr-org-2064 193 227 December December NNP blog-dshr-org-2064 193 228 ( ( -LRB- blog-dshr-org-2064 193 229 7 7 CD blog-dshr-org-2064 193 230 ) ) -RRB- blog-dshr-org-2064 193 231 ► ► NFP blog-dshr-org-2064 193 232     _SP blog-dshr-org-2064 193 233 November November NNP blog-dshr-org-2064 193 234 ( ( -LRB- blog-dshr-org-2064 193 235 8) 8) CD blog-dshr-org-2064 193 236 ► ► CD blog-dshr-org-2064 193 237     _SP blog-dshr-org-2064 193 238 October October NNP blog-dshr-org-2064 193 239 ( ( -LRB- blog-dshr-org-2064 193 240 10 10 CD blog-dshr-org-2064 193 241 ) ) -RRB- blog-dshr-org-2064 193 242 ► ► NFP blog-dshr-org-2064 193 243     _SP blog-dshr-org-2064 193 244 September September NNP blog-dshr-org-2064 193 245 ( ( -LRB- blog-dshr-org-2064 193 246 5 5 CD blog-dshr-org-2064 193 247 ) ) -RRB- blog-dshr-org-2064 193 248 ► ► NFP blog-dshr-org-2064 193 249     _SP blog-dshr-org-2064 193 250 August August NNP blog-dshr-org-2064 193 251 ( ( -LRB- blog-dshr-org-2064 193 252 8) 8) CD blog-dshr-org-2064 193 253 ► ► CD blog-dshr-org-2064 193 254     _SP blog-dshr-org-2064 193 255 July July NNP blog-dshr-org-2064 193 256 ( ( -LRB- blog-dshr-org-2064 193 257 5 5 CD blog-dshr-org-2064 193 258 ) ) -RRB- blog-dshr-org-2064 193 259 ► ► NFP blog-dshr-org-2064 193 260     _SP blog-dshr-org-2064 193 261 June June NNP blog-dshr-org-2064 193 262 ( ( -LRB- blog-dshr-org-2064 193 263 7 7 CD blog-dshr-org-2064 193 264 ) ) -RRB- blog-dshr-org-2064 193 265 ► ► NFP blog-dshr-org-2064 193 266     _SP blog-dshr-org-2064 193 267 May May NNP blog-dshr-org-2064 193 268 ( ( -LRB- blog-dshr-org-2064 193 269 10 10 CD blog-dshr-org-2064 193 270 ) ) -RRB- blog-dshr-org-2064 193 271 ► ► NFP blog-dshr-org-2064 193 272     _SP blog-dshr-org-2064 193 273 April April NNP blog-dshr-org-2064 193 274 ( ( -LRB- blog-dshr-org-2064 193 275 8) 8) CD blog-dshr-org-2064 193 276 ► ► CD blog-dshr-org-2064 193 277     _SP blog-dshr-org-2064 193 278 March March NNP blog-dshr-org-2064 193 279 ( ( -LRB- blog-dshr-org-2064 193 280 9 9 CD blog-dshr-org-2064 193 281 ) ) -RRB- blog-dshr-org-2064 193 282 ► ► NFP blog-dshr-org-2064 193 283     _SP blog-dshr-org-2064 193 284 February February NNP blog-dshr-org-2064 193 285 ( ( -LRB- blog-dshr-org-2064 193 286 9 9 CD blog-dshr-org-2064 193 287 ) ) -RRB- blog-dshr-org-2064 193 288 ► ► NFP blog-dshr-org-2064 193 289     _SP blog-dshr-org-2064 193 290 January January NNP blog-dshr-org-2064 193 291 ( ( -LRB- blog-dshr-org-2064 193 292 10 10 CD blog-dshr-org-2064 193 293 ) ) -RRB- blog-dshr-org-2064 193 294 ▼ ▼ CD blog-dshr-org-2064 193 295     _SP blog-dshr-org-2064 193 296 2017 2017 CD blog-dshr-org-2064 193 297 ( ( -LRB- blog-dshr-org-2064 193 298 82 82 CD blog-dshr-org-2064 193 299 ) ) -RRB- blog-dshr-org-2064 193 300 ▼ ▼ CD blog-dshr-org-2064 193 301     _SP blog-dshr-org-2064 193 302 December December NNP blog-dshr-org-2064 193 303 ( ( -LRB- blog-dshr-org-2064 193 304 6 6 CD blog-dshr-org-2064 193 305 ) ) -RRB- blog-dshr-org-2064 193 306 Why why WRB blog-dshr-org-2064 193 307 Decentralize decentralize IN blog-dshr-org-2064 193 308 ? ? . blog-dshr-org-2064 194 1 Updating update VBG blog-dshr-org-2064 194 2 Flash Flash NNP blog-dshr-org-2064 194 3 vs. vs. IN blog-dshr-org-2064 194 4 Hard Hard NNP blog-dshr-org-2064 194 5 Disk Disk NNP blog-dshr-org-2064 194 6 Science Science NNP blog-dshr-org-2064 194 7 Friday Friday NNP blog-dshr-org-2064 194 8 's 's POS blog-dshr-org-2064 194 9 " " `` blog-dshr-org-2064 194 10 File file NN blog-dshr-org-2064 194 11 Not not RB blog-dshr-org-2064 194 12 Found find VBN blog-dshr-org-2064 194 13 " " `` blog-dshr-org-2064 194 14 Bad Bad NNP blog-dshr-org-2064 194 15 Identifiers Identifiers NNPS blog-dshr-org-2064 194 16 Cliff Cliff NNP blog-dshr-org-2064 194 17 Lynch Lynch NNP blog-dshr-org-2064 194 18 's 's POS blog-dshr-org-2064 194 19 Stewardship Stewardship NNP blog-dshr-org-2064 194 20 in in IN blog-dshr-org-2064 194 21 the the DT blog-dshr-org-2064 194 22 " " `` blog-dshr-org-2064 194 23 Age Age NNP blog-dshr-org-2064 194 24 of of IN blog-dshr-org-2064 194 25 Algorithms Algorithms NNP blog-dshr-org-2064 194 26 " " `` blog-dshr-org-2064 194 27 International International NNP blog-dshr-org-2064 194 28 Digital Digital NNP blog-dshr-org-2064 194 29 Preservation Preservation NNP blog-dshr-org-2064 194 30 Day Day NNP blog-dshr-org-2064 194 31 ► ► CD blog-dshr-org-2064 194 32     _SP blog-dshr-org-2064 194 33 November November NNP blog-dshr-org-2064 194 34 ( ( -LRB- blog-dshr-org-2064 194 35 6 6 CD blog-dshr-org-2064 194 36 ) ) -RRB- blog-dshr-org-2064 194 37 ► ► NFP blog-dshr-org-2064 194 38     _SP blog-dshr-org-2064 194 39 October October NNP blog-dshr-org-2064 194 40 ( ( -LRB- blog-dshr-org-2064 194 41 8) 8) CD blog-dshr-org-2064 194 42 ► ► CD blog-dshr-org-2064 194 43     _SP blog-dshr-org-2064 194 44 September September NNP blog-dshr-org-2064 194 45 ( ( -LRB- blog-dshr-org-2064 194 46 6 6 CD blog-dshr-org-2064 194 47 ) ) -RRB- blog-dshr-org-2064 194 48 ► ► NFP blog-dshr-org-2064 194 49     _SP blog-dshr-org-2064 194 50 August August NNP blog-dshr-org-2064 194 51 ( ( -LRB- blog-dshr-org-2064 194 52 7 7 CD blog-dshr-org-2064 194 53 ) ) -RRB- blog-dshr-org-2064 194 54 ► ► NFP blog-dshr-org-2064 194 55     _SP blog-dshr-org-2064 194 56 July July NNP blog-dshr-org-2064 194 57 ( ( -LRB- blog-dshr-org-2064 194 58 5 5 CD blog-dshr-org-2064 194 59 ) ) -RRB- blog-dshr-org-2064 194 60 ► ► NFP blog-dshr-org-2064 194 61     _SP blog-dshr-org-2064 194 62 June June NNP blog-dshr-org-2064 194 63 ( ( -LRB- blog-dshr-org-2064 194 64 7 7 CD blog-dshr-org-2064 194 65 ) ) -RRB- blog-dshr-org-2064 194 66 ► ► NFP blog-dshr-org-2064 194 67     _SP blog-dshr-org-2064 194 68 May May NNP blog-dshr-org-2064 194 69 ( ( -LRB- blog-dshr-org-2064 194 70 6 6 CD blog-dshr-org-2064 194 71 ) ) -RRB- blog-dshr-org-2064 194 72 ► ► NFP blog-dshr-org-2064 194 73     _SP blog-dshr-org-2064 194 74 April April NNP blog-dshr-org-2064 194 75 ( ( -LRB- blog-dshr-org-2064 194 76 7 7 CD blog-dshr-org-2064 194 77 ) ) -RRB- blog-dshr-org-2064 194 78 ► ► NFP blog-dshr-org-2064 194 79     _SP blog-dshr-org-2064 194 80 March March NNP blog-dshr-org-2064 194 81 ( ( -LRB- blog-dshr-org-2064 194 82 11 11 CD blog-dshr-org-2064 194 83 ) ) -RRB- blog-dshr-org-2064 194 84 ► ► NFP blog-dshr-org-2064 194 85     _SP blog-dshr-org-2064 194 86 February February NNP blog-dshr-org-2064 194 87 ( ( -LRB- blog-dshr-org-2064 194 88 5 5 CD blog-dshr-org-2064 194 89 ) ) -RRB- blog-dshr-org-2064 194 90 ► ► NFP blog-dshr-org-2064 194 91     _SP blog-dshr-org-2064 194 92 January January NNP blog-dshr-org-2064 194 93 ( ( -LRB- blog-dshr-org-2064 194 94 8) 8) CD blog-dshr-org-2064 194 95 ► ► CD blog-dshr-org-2064 194 96     _SP blog-dshr-org-2064 194 97 2016 2016 CD blog-dshr-org-2064 194 98 ( ( -LRB- blog-dshr-org-2064 194 99 89 89 CD blog-dshr-org-2064 194 100 ) ) -RRB- blog-dshr-org-2064 194 101 ► ► NFP blog-dshr-org-2064 194 102     _SP blog-dshr-org-2064 194 103 December December NNP blog-dshr-org-2064 194 104 ( ( -LRB- blog-dshr-org-2064 194 105 4 4 CD blog-dshr-org-2064 194 106 ) ) -RRB- blog-dshr-org-2064 194 107 ► ► NFP blog-dshr-org-2064 194 108     _SP blog-dshr-org-2064 194 109 November November NNP blog-dshr-org-2064 194 110 ( ( -LRB- blog-dshr-org-2064 194 111 8) 8) CD blog-dshr-org-2064 194 112 ► ► CD blog-dshr-org-2064 194 113     _SP blog-dshr-org-2064 194 114 October October NNP blog-dshr-org-2064 194 115 ( ( -LRB- blog-dshr-org-2064 194 116 10 10 CD blog-dshr-org-2064 194 117 ) ) -RRB- blog-dshr-org-2064 194 118 ► ► NFP blog-dshr-org-2064 194 119     _SP blog-dshr-org-2064 194 120 September September NNP blog-dshr-org-2064 194 121 ( ( -LRB- blog-dshr-org-2064 194 122 8) 8) CD blog-dshr-org-2064 194 123 ► ► CD blog-dshr-org-2064 194 124     _SP blog-dshr-org-2064 194 125 August August NNP blog-dshr-org-2064 194 126 ( ( -LRB- blog-dshr-org-2064 194 127 8) 8) CD blog-dshr-org-2064 194 128 ► ► CD blog-dshr-org-2064 194 129     _SP blog-dshr-org-2064 194 130 July July NNP blog-dshr-org-2064 194 131 ( ( -LRB- blog-dshr-org-2064 194 132 7 7 CD blog-dshr-org-2064 194 133 ) ) -RRB- blog-dshr-org-2064 194 134 ► ► NFP blog-dshr-org-2064 194 135     _SP blog-dshr-org-2064 194 136 June June NNP blog-dshr-org-2064 194 137 ( ( -LRB- blog-dshr-org-2064 194 138 8) 8) CD blog-dshr-org-2064 194 139 ► ► CD blog-dshr-org-2064 194 140     _SP blog-dshr-org-2064 194 141 May May NNP blog-dshr-org-2064 194 142 ( ( -LRB- blog-dshr-org-2064 194 143 7 7 CD blog-dshr-org-2064 194 144 ) ) -RRB- blog-dshr-org-2064 194 145 ► ► NFP blog-dshr-org-2064 194 146     _SP blog-dshr-org-2064 194 147 April April NNP blog-dshr-org-2064 194 148 ( ( -LRB- blog-dshr-org-2064 194 149 5 5 CD blog-dshr-org-2064 194 150 ) ) -RRB- blog-dshr-org-2064 194 151 ► ► NFP blog-dshr-org-2064 194 152     _SP blog-dshr-org-2064 194 153 March March NNP blog-dshr-org-2064 194 154 ( ( -LRB- blog-dshr-org-2064 194 155 10 10 CD blog-dshr-org-2064 194 156 ) ) -RRB- blog-dshr-org-2064 194 157 ► ► NFP blog-dshr-org-2064 194 158     _SP blog-dshr-org-2064 194 159 February February NNP blog-dshr-org-2064 194 160 ( ( -LRB- blog-dshr-org-2064 194 161 7 7 CD blog-dshr-org-2064 194 162 ) ) -RRB- blog-dshr-org-2064 194 163 ► ► NFP blog-dshr-org-2064 194 164     _SP blog-dshr-org-2064 194 165 January January NNP blog-dshr-org-2064 194 166 ( ( -LRB- blog-dshr-org-2064 194 167 7 7 CD blog-dshr-org-2064 194 168 ) ) -RRB- blog-dshr-org-2064 194 169 ► ► NFP blog-dshr-org-2064 194 170     _SP blog-dshr-org-2064 194 171 2015 2015 CD blog-dshr-org-2064 194 172 ( ( -LRB- blog-dshr-org-2064 194 173 75 75 CD blog-dshr-org-2064 194 174 ) ) -RRB- blog-dshr-org-2064 194 175 ► ► NFP blog-dshr-org-2064 194 176     _SP blog-dshr-org-2064 194 177 December December NNP blog-dshr-org-2064 194 178 ( ( -LRB- blog-dshr-org-2064 194 179 7 7 CD blog-dshr-org-2064 194 180 ) ) -RRB- blog-dshr-org-2064 194 181 ► ► NFP blog-dshr-org-2064 194 182     _SP blog-dshr-org-2064 194 183 November November NNP blog-dshr-org-2064 194 184 ( ( -LRB- blog-dshr-org-2064 194 185 5 5 CD blog-dshr-org-2064 194 186 ) ) -RRB- blog-dshr-org-2064 194 187 ► ► NFP blog-dshr-org-2064 194 188     _SP blog-dshr-org-2064 194 189 October October NNP blog-dshr-org-2064 194 190 ( ( -LRB- blog-dshr-org-2064 194 191 11 11 CD blog-dshr-org-2064 194 192 ) ) -RRB- blog-dshr-org-2064 194 193 ► ► NFP blog-dshr-org-2064 194 194     _SP blog-dshr-org-2064 194 195 September September NNP blog-dshr-org-2064 194 196 ( ( -LRB- blog-dshr-org-2064 194 197 5 5 CD blog-dshr-org-2064 194 198 ) ) -RRB- blog-dshr-org-2064 194 199 ► ► NFP blog-dshr-org-2064 194 200     _SP blog-dshr-org-2064 194 201 August August NNP blog-dshr-org-2064 194 202 ( ( -LRB- blog-dshr-org-2064 194 203 3 3 CD blog-dshr-org-2064 194 204 ) ) -RRB- blog-dshr-org-2064 194 205 ► ► NFP blog-dshr-org-2064 194 206     _SP blog-dshr-org-2064 194 207 July July NNP blog-dshr-org-2064 194 208 ( ( -LRB- blog-dshr-org-2064 194 209 3 3 CD blog-dshr-org-2064 194 210 ) ) -RRB- blog-dshr-org-2064 194 211 ► ► NFP blog-dshr-org-2064 194 212     _SP blog-dshr-org-2064 194 213 June June NNP blog-dshr-org-2064 194 214 ( ( -LRB- blog-dshr-org-2064 194 215 8) 8) CD blog-dshr-org-2064 194 216 ► ► CD blog-dshr-org-2064 194 217     _SP blog-dshr-org-2064 194 218 May May NNP blog-dshr-org-2064 194 219 ( ( -LRB- blog-dshr-org-2064 194 220 10 10 CD blog-dshr-org-2064 194 221 ) ) -RRB- blog-dshr-org-2064 194 222 ► ► NFP blog-dshr-org-2064 194 223     _SP blog-dshr-org-2064 194 224 April April NNP blog-dshr-org-2064 194 225 ( ( -LRB- blog-dshr-org-2064 194 226 6 6 CD blog-dshr-org-2064 194 227 ) ) -RRB- blog-dshr-org-2064 194 228 ► ► NFP blog-dshr-org-2064 194 229     _SP blog-dshr-org-2064 194 230 March March NNP blog-dshr-org-2064 194 231 ( ( -LRB- blog-dshr-org-2064 194 232 6 6 CD blog-dshr-org-2064 194 233 ) ) -RRB- blog-dshr-org-2064 194 234 ► ► NFP blog-dshr-org-2064 194 235     _SP blog-dshr-org-2064 194 236 February February NNP blog-dshr-org-2064 194 237 ( ( -LRB- blog-dshr-org-2064 194 238 7 7 CD blog-dshr-org-2064 194 239 ) ) -RRB- blog-dshr-org-2064 194 240 ► ► NFP blog-dshr-org-2064 194 241     _SP blog-dshr-org-2064 194 242 January January NNP blog-dshr-org-2064 194 243 ( ( -LRB- blog-dshr-org-2064 194 244 4 4 CD blog-dshr-org-2064 194 245 ) ) -RRB- blog-dshr-org-2064 194 246 ► ► CD blog-dshr-org-2064 194 247     _SP blog-dshr-org-2064 194 248 2014 2014 CD blog-dshr-org-2064 194 249 ( ( -LRB- blog-dshr-org-2064 194 250 68 68 CD blog-dshr-org-2064 194 251 ) ) -RRB- blog-dshr-org-2064 194 252 ► ► NFP blog-dshr-org-2064 194 253     _SP blog-dshr-org-2064 194 254 December December NNP blog-dshr-org-2064 194 255 ( ( -LRB- blog-dshr-org-2064 194 256 7 7 CD blog-dshr-org-2064 194 257 ) ) -RRB- blog-dshr-org-2064 194 258 ► ► NFP blog-dshr-org-2064 194 259     _SP blog-dshr-org-2064 194 260 November November NNP blog-dshr-org-2064 194 261 ( ( -LRB- blog-dshr-org-2064 194 262 8) 8) CD blog-dshr-org-2064 194 263 ► ► CD blog-dshr-org-2064 194 264     _SP blog-dshr-org-2064 194 265 October October NNP blog-dshr-org-2064 194 266 ( ( -LRB- blog-dshr-org-2064 194 267 6 6 CD blog-dshr-org-2064 194 268 ) ) -RRB- blog-dshr-org-2064 194 269 ► ► NFP blog-dshr-org-2064 194 270     _SP blog-dshr-org-2064 194 271 September September NNP blog-dshr-org-2064 194 272 ( ( -LRB- blog-dshr-org-2064 194 273 8) 8) CD blog-dshr-org-2064 194 274 ► ► CD blog-dshr-org-2064 194 275     _SP blog-dshr-org-2064 194 276 August August NNP blog-dshr-org-2064 194 277 ( ( -LRB- blog-dshr-org-2064 194 278 7 7 CD blog-dshr-org-2064 194 279 ) ) -RRB- blog-dshr-org-2064 194 280 ► ► NFP blog-dshr-org-2064 194 281     _SP blog-dshr-org-2064 194 282 July July NNP blog-dshr-org-2064 194 283 ( ( -LRB- blog-dshr-org-2064 194 284 3 3 CD blog-dshr-org-2064 194 285 ) ) -RRB- blog-dshr-org-2064 194 286 ► ► NFP blog-dshr-org-2064 194 287     _SP blog-dshr-org-2064 194 288 June June NNP blog-dshr-org-2064 194 289 ( ( -LRB- blog-dshr-org-2064 194 290 5 5 CD blog-dshr-org-2064 194 291 ) ) -RRB- blog-dshr-org-2064 194 292 ► ► NFP blog-dshr-org-2064 194 293     _SP blog-dshr-org-2064 194 294 May May NNP blog-dshr-org-2064 194 295 ( ( -LRB- blog-dshr-org-2064 194 296 6 6 CD blog-dshr-org-2064 194 297 ) ) -RRB- blog-dshr-org-2064 194 298 ► ► NFP blog-dshr-org-2064 194 299     _SP blog-dshr-org-2064 194 300 April April NNP blog-dshr-org-2064 194 301 ( ( -LRB- blog-dshr-org-2064 194 302 5 5 CD blog-dshr-org-2064 194 303 ) ) -RRB- blog-dshr-org-2064 194 304 ► ► NFP blog-dshr-org-2064 194 305     _SP blog-dshr-org-2064 194 306 March March NNP blog-dshr-org-2064 194 307 ( ( -LRB- blog-dshr-org-2064 194 308 6 6 CD blog-dshr-org-2064 194 309 ) ) -RRB- blog-dshr-org-2064 194 310 ► ► NFP blog-dshr-org-2064 194 311     _SP blog-dshr-org-2064 194 312 February February NNP blog-dshr-org-2064 194 313 ( ( -LRB- blog-dshr-org-2064 194 314 2 2 CD blog-dshr-org-2064 194 315 ) ) -RRB- blog-dshr-org-2064 194 316 ► ► NFP blog-dshr-org-2064 194 317     _SP blog-dshr-org-2064 194 318 January January NNP blog-dshr-org-2064 194 319 ( ( -LRB- blog-dshr-org-2064 194 320 5 5 CD blog-dshr-org-2064 194 321 ) ) -RRB- blog-dshr-org-2064 194 322 ► ► CD blog-dshr-org-2064 194 323     _SP blog-dshr-org-2064 194 324 2013 2013 CD blog-dshr-org-2064 194 325 ( ( -LRB- blog-dshr-org-2064 194 326 67 67 CD blog-dshr-org-2064 194 327 ) ) -RRB- blog-dshr-org-2064 194 328 ► ► NFP blog-dshr-org-2064 194 329     _SP blog-dshr-org-2064 194 330 December December NNP blog-dshr-org-2064 194 331 ( ( -LRB- blog-dshr-org-2064 194 332 3 3 CD blog-dshr-org-2064 194 333 ) ) -RRB- blog-dshr-org-2064 194 334 ► ► NFP blog-dshr-org-2064 194 335     _SP blog-dshr-org-2064 194 336 November November NNP blog-dshr-org-2064 194 337 ( ( -LRB- blog-dshr-org-2064 194 338 6 6 CD blog-dshr-org-2064 194 339 ) ) -RRB- blog-dshr-org-2064 194 340 ► ► NFP blog-dshr-org-2064 194 341     _SP blog-dshr-org-2064 194 342 October October NNP blog-dshr-org-2064 194 343 ( ( -LRB- blog-dshr-org-2064 194 344 7 7 CD blog-dshr-org-2064 194 345 ) ) -RRB- blog-dshr-org-2064 194 346 ► ► NFP blog-dshr-org-2064 194 347     _SP blog-dshr-org-2064 194 348 September September NNP blog-dshr-org-2064 194 349 ( ( -LRB- blog-dshr-org-2064 194 350 6 6 CD blog-dshr-org-2064 194 351 ) ) -RRB- blog-dshr-org-2064 194 352 ► ► NFP blog-dshr-org-2064 194 353     _SP blog-dshr-org-2064 194 354 August August NNP blog-dshr-org-2064 194 355 ( ( -LRB- blog-dshr-org-2064 194 356 3 3 CD blog-dshr-org-2064 194 357 ) ) -RRB- blog-dshr-org-2064 194 358 ► ► NFP blog-dshr-org-2064 194 359     _SP blog-dshr-org-2064 194 360 July July NNP blog-dshr-org-2064 194 361 ( ( -LRB- blog-dshr-org-2064 194 362 5 5 CD blog-dshr-org-2064 194 363 ) ) -RRB- blog-dshr-org-2064 194 364 ► ► NFP blog-dshr-org-2064 194 365     _SP blog-dshr-org-2064 194 366 June June NNP blog-dshr-org-2064 194 367 ( ( -LRB- blog-dshr-org-2064 194 368 6 6 CD blog-dshr-org-2064 194 369 ) ) -RRB- blog-dshr-org-2064 194 370 ► ► NFP blog-dshr-org-2064 194 371     _SP blog-dshr-org-2064 194 372 May May NNP blog-dshr-org-2064 194 373 ( ( -LRB- blog-dshr-org-2064 194 374 5 5 CD blog-dshr-org-2064 194 375 ) ) -RRB- blog-dshr-org-2064 194 376 ► ► NFP blog-dshr-org-2064 194 377     _SP blog-dshr-org-2064 194 378 April April NNP blog-dshr-org-2064 194 379 ( ( -LRB- blog-dshr-org-2064 194 380 9 9 CD blog-dshr-org-2064 194 381 ) ) -RRB- blog-dshr-org-2064 194 382 ► ► NFP blog-dshr-org-2064 194 383     _SP blog-dshr-org-2064 194 384 March March NNP blog-dshr-org-2064 194 385 ( ( -LRB- blog-dshr-org-2064 194 386 5 5 CD blog-dshr-org-2064 194 387 ) ) -RRB- blog-dshr-org-2064 194 388 ► ► NFP blog-dshr-org-2064 194 389     _SP blog-dshr-org-2064 194 390 February February NNP blog-dshr-org-2064 194 391 ( ( -LRB- blog-dshr-org-2064 194 392 5 5 CD blog-dshr-org-2064 194 393 ) ) -RRB- blog-dshr-org-2064 194 394 ► ► NFP blog-dshr-org-2064 194 395     _SP blog-dshr-org-2064 194 396 January January NNP blog-dshr-org-2064 194 397 ( ( -LRB- blog-dshr-org-2064 194 398 7 7 CD blog-dshr-org-2064 194 399 ) ) -RRB- blog-dshr-org-2064 194 400 ► ► CD blog-dshr-org-2064 194 401     _SP blog-dshr-org-2064 194 402 2012 2012 CD blog-dshr-org-2064 194 403 ( ( -LRB- blog-dshr-org-2064 194 404 43 43 CD blog-dshr-org-2064 194 405 ) ) -RRB- blog-dshr-org-2064 194 406 ► ► NFP blog-dshr-org-2064 194 407     _SP blog-dshr-org-2064 194 408 December December NNP blog-dshr-org-2064 194 409 ( ( -LRB- blog-dshr-org-2064 194 410 4 4 CD blog-dshr-org-2064 194 411 ) ) -RRB- blog-dshr-org-2064 194 412 ► ► NFP blog-dshr-org-2064 194 413     _SP blog-dshr-org-2064 194 414 November November NNP blog-dshr-org-2064 194 415 ( ( -LRB- blog-dshr-org-2064 194 416 4 4 CD blog-dshr-org-2064 194 417 ) ) -RRB- blog-dshr-org-2064 194 418 ► ► NFP blog-dshr-org-2064 194 419     _SP blog-dshr-org-2064 194 420 October October NNP blog-dshr-org-2064 194 421 ( ( -LRB- blog-dshr-org-2064 194 422 6 6 CD blog-dshr-org-2064 194 423 ) ) -RRB- blog-dshr-org-2064 194 424 ► ► NFP blog-dshr-org-2064 194 425     _SP blog-dshr-org-2064 194 426 September September NNP blog-dshr-org-2064 194 427 ( ( -LRB- blog-dshr-org-2064 194 428 6 6 CD blog-dshr-org-2064 194 429 ) ) -RRB- blog-dshr-org-2064 194 430 ► ► NFP blog-dshr-org-2064 194 431     _SP blog-dshr-org-2064 194 432 August August NNP blog-dshr-org-2064 194 433 ( ( -LRB- blog-dshr-org-2064 194 434 2 2 CD blog-dshr-org-2064 194 435 ) ) -RRB- blog-dshr-org-2064 194 436 ► ► NFP blog-dshr-org-2064 194 437     _SP blog-dshr-org-2064 194 438 July July NNP blog-dshr-org-2064 194 439 ( ( -LRB- blog-dshr-org-2064 194 440 5 5 CD blog-dshr-org-2064 194 441 ) ) -RRB- blog-dshr-org-2064 194 442 ► ► NFP blog-dshr-org-2064 194 443     _SP blog-dshr-org-2064 194 444 June June NNP blog-dshr-org-2064 194 445 ( ( -LRB- blog-dshr-org-2064 194 446 2 2 CD blog-dshr-org-2064 194 447 ) ) -RRB- blog-dshr-org-2064 194 448 ► ► NFP blog-dshr-org-2064 194 449     _SP blog-dshr-org-2064 194 450 May May NNP blog-dshr-org-2064 194 451 ( ( -LRB- blog-dshr-org-2064 194 452 5 5 CD blog-dshr-org-2064 194 453 ) ) -RRB- blog-dshr-org-2064 194 454 ► ► NFP blog-dshr-org-2064 194 455     _SP blog-dshr-org-2064 194 456 March March NNP blog-dshr-org-2064 194 457 ( ( -LRB- blog-dshr-org-2064 194 458 1 1 CD blog-dshr-org-2064 194 459 ) ) -RRB- blog-dshr-org-2064 194 460 ► ► NFP blog-dshr-org-2064 194 461     _SP blog-dshr-org-2064 194 462 February February NNP blog-dshr-org-2064 194 463 ( ( -LRB- blog-dshr-org-2064 194 464 5 5 CD blog-dshr-org-2064 194 465 ) ) -RRB- blog-dshr-org-2064 194 466 ► ► NFP blog-dshr-org-2064 194 467     _SP blog-dshr-org-2064 194 468 January January NNP blog-dshr-org-2064 194 469 ( ( -LRB- blog-dshr-org-2064 194 470 3 3 CD blog-dshr-org-2064 194 471 ) ) -RRB- blog-dshr-org-2064 194 472 ► ► CD blog-dshr-org-2064 194 473     _SP blog-dshr-org-2064 194 474 2011 2011 CD blog-dshr-org-2064 194 475 ( ( -LRB- blog-dshr-org-2064 194 476 40 40 CD blog-dshr-org-2064 194 477 ) ) -RRB- blog-dshr-org-2064 194 478 ► ► NFP blog-dshr-org-2064 194 479     _SP blog-dshr-org-2064 194 480 December December NNP blog-dshr-org-2064 194 481 ( ( -LRB- blog-dshr-org-2064 194 482 2 2 CD blog-dshr-org-2064 194 483 ) ) -RRB- blog-dshr-org-2064 194 484 ► ► NFP blog-dshr-org-2064 194 485     _SP blog-dshr-org-2064 194 486 November November NNP blog-dshr-org-2064 194 487 ( ( -LRB- blog-dshr-org-2064 194 488 1 1 CD blog-dshr-org-2064 194 489 ) ) -RRB- blog-dshr-org-2064 194 490 ► ► NFP blog-dshr-org-2064 194 491     _SP blog-dshr-org-2064 194 492 October October NNP blog-dshr-org-2064 194 493 ( ( -LRB- blog-dshr-org-2064 194 494 7 7 CD blog-dshr-org-2064 194 495 ) ) -RRB- blog-dshr-org-2064 194 496 ► ► NFP blog-dshr-org-2064 194 497     _SP blog-dshr-org-2064 194 498 September September NNP blog-dshr-org-2064 194 499 ( ( -LRB- blog-dshr-org-2064 194 500 3 3 CD blog-dshr-org-2064 194 501 ) ) -RRB- blog-dshr-org-2064 194 502 ► ► NFP blog-dshr-org-2064 194 503     _SP blog-dshr-org-2064 194 504 August August NNP blog-dshr-org-2064 194 505 ( ( -LRB- blog-dshr-org-2064 194 506 5 5 CD blog-dshr-org-2064 194 507 ) ) -RRB- blog-dshr-org-2064 194 508 ► ► NFP blog-dshr-org-2064 194 509     _SP blog-dshr-org-2064 194 510 July July NNP blog-dshr-org-2064 194 511 ( ( -LRB- blog-dshr-org-2064 194 512 2 2 CD blog-dshr-org-2064 194 513 ) ) -RRB- blog-dshr-org-2064 194 514 ► ► NFP blog-dshr-org-2064 194 515     _SP blog-dshr-org-2064 194 516 June June NNP blog-dshr-org-2064 194 517 ( ( -LRB- blog-dshr-org-2064 194 518 2 2 CD blog-dshr-org-2064 194 519 ) ) -RRB- blog-dshr-org-2064 194 520 ► ► NFP blog-dshr-org-2064 194 521     _SP blog-dshr-org-2064 194 522 May May NNP blog-dshr-org-2064 194 523 ( ( -LRB- blog-dshr-org-2064 194 524 2 2 CD blog-dshr-org-2064 194 525 ) ) -RRB- blog-dshr-org-2064 194 526 ► ► NFP blog-dshr-org-2064 194 527     _SP blog-dshr-org-2064 194 528 April April NNP blog-dshr-org-2064 194 529 ( ( -LRB- blog-dshr-org-2064 194 530 4 4 CD blog-dshr-org-2064 194 531 ) ) -RRB- blog-dshr-org-2064 194 532 ► ► NFP blog-dshr-org-2064 194 533     _SP blog-dshr-org-2064 194 534 March March NNP blog-dshr-org-2064 194 535 ( ( -LRB- blog-dshr-org-2064 194 536 4 4 CD blog-dshr-org-2064 194 537 ) ) -RRB- blog-dshr-org-2064 194 538 ► ► NFP blog-dshr-org-2064 194 539     _SP blog-dshr-org-2064 194 540 February February NNP blog-dshr-org-2064 194 541 ( ( -LRB- blog-dshr-org-2064 194 542 4 4 CD blog-dshr-org-2064 194 543 ) ) -RRB- blog-dshr-org-2064 194 544 ► ► NFP blog-dshr-org-2064 194 545     _SP blog-dshr-org-2064 194 546 January January NNP blog-dshr-org-2064 194 547 ( ( -LRB- blog-dshr-org-2064 194 548 4 4 CD blog-dshr-org-2064 194 549 ) ) -RRB- blog-dshr-org-2064 194 550 ► ► CD blog-dshr-org-2064 194 551     _SP blog-dshr-org-2064 194 552 2010 2010 CD blog-dshr-org-2064 194 553 ( ( -LRB- blog-dshr-org-2064 194 554 17 17 CD blog-dshr-org-2064 194 555 ) ) -RRB- blog-dshr-org-2064 194 556 ► ► NFP blog-dshr-org-2064 194 557     _SP blog-dshr-org-2064 194 558 December December NNP blog-dshr-org-2064 194 559 ( ( -LRB- blog-dshr-org-2064 194 560 5 5 CD blog-dshr-org-2064 194 561 ) ) -RRB- blog-dshr-org-2064 194 562 ► ► NFP blog-dshr-org-2064 194 563     _SP blog-dshr-org-2064 194 564 November November NNP blog-dshr-org-2064 194 565 ( ( -LRB- blog-dshr-org-2064 194 566 3 3 CD blog-dshr-org-2064 194 567 ) ) -RRB- blog-dshr-org-2064 194 568 ► ► NFP blog-dshr-org-2064 194 569     _SP blog-dshr-org-2064 194 570 October October NNP blog-dshr-org-2064 194 571 ( ( -LRB- blog-dshr-org-2064 194 572 4 4 CD blog-dshr-org-2064 194 573 ) ) -RRB- blog-dshr-org-2064 194 574 ► ► NFP blog-dshr-org-2064 194 575     _SP blog-dshr-org-2064 194 576 September September NNP blog-dshr-org-2064 194 577 ( ( -LRB- blog-dshr-org-2064 194 578 2 2 CD blog-dshr-org-2064 194 579 ) ) -RRB- blog-dshr-org-2064 194 580 ► ► NFP blog-dshr-org-2064 194 581     _SP blog-dshr-org-2064 194 582 July July NNP blog-dshr-org-2064 194 583 ( ( -LRB- blog-dshr-org-2064 194 584 1 1 CD blog-dshr-org-2064 194 585 ) ) -RRB- blog-dshr-org-2064 194 586 ► ► NFP blog-dshr-org-2064 194 587     _SP blog-dshr-org-2064 194 588 June June NNP blog-dshr-org-2064 194 589 ( ( -LRB- blog-dshr-org-2064 194 590 1 1 CD blog-dshr-org-2064 194 591 ) ) -RRB- blog-dshr-org-2064 194 592 ► ► NFP blog-dshr-org-2064 194 593     _SP blog-dshr-org-2064 194 594 February February NNP blog-dshr-org-2064 194 595 ( ( -LRB- blog-dshr-org-2064 194 596 1 1 CD blog-dshr-org-2064 194 597 ) ) -RRB- blog-dshr-org-2064 194 598 ► ► NFP blog-dshr-org-2064 194 599     _SP blog-dshr-org-2064 194 600 2009 2009 CD blog-dshr-org-2064 194 601 ( ( -LRB- blog-dshr-org-2064 194 602 8) 8) CD blog-dshr-org-2064 194 603 ► ► CD blog-dshr-org-2064 194 604     _SP blog-dshr-org-2064 194 605 July July NNP blog-dshr-org-2064 194 606 ( ( -LRB- blog-dshr-org-2064 194 607 1 1 CD blog-dshr-org-2064 194 608 ) ) -RRB- blog-dshr-org-2064 194 609 ► ► NFP blog-dshr-org-2064 194 610     _SP blog-dshr-org-2064 194 611 June June NNP blog-dshr-org-2064 194 612 ( ( -LRB- blog-dshr-org-2064 194 613 1 1 CD blog-dshr-org-2064 194 614 ) ) -RRB- blog-dshr-org-2064 194 615 ► ► NFP blog-dshr-org-2064 194 616     _SP blog-dshr-org-2064 194 617 May May NNP blog-dshr-org-2064 194 618 ( ( -LRB- blog-dshr-org-2064 194 619 1 1 CD blog-dshr-org-2064 194 620 ) ) -RRB- blog-dshr-org-2064 194 621 ► ► NFP blog-dshr-org-2064 194 622     _SP blog-dshr-org-2064 194 623 April April NNP blog-dshr-org-2064 194 624 ( ( -LRB- blog-dshr-org-2064 194 625 1 1 CD blog-dshr-org-2064 194 626 ) ) -RRB- blog-dshr-org-2064 194 627 ► ► NFP blog-dshr-org-2064 194 628     _SP blog-dshr-org-2064 194 629 March March NNP blog-dshr-org-2064 194 630 ( ( -LRB- blog-dshr-org-2064 194 631 2 2 CD blog-dshr-org-2064 194 632 ) ) -RRB- blog-dshr-org-2064 194 633 ► ► NFP blog-dshr-org-2064 194 634     _SP blog-dshr-org-2064 194 635 January January NNP blog-dshr-org-2064 194 636 ( ( -LRB- blog-dshr-org-2064 194 637 2 2 CD blog-dshr-org-2064 194 638 ) ) -RRB- blog-dshr-org-2064 194 639 ► ► NFP blog-dshr-org-2064 194 640     _SP blog-dshr-org-2064 194 641 2008 2008 CD blog-dshr-org-2064 194 642 ( ( -LRB- blog-dshr-org-2064 194 643 8) 8) CD blog-dshr-org-2064 194 644 ► ► CD blog-dshr-org-2064 194 645     _SP blog-dshr-org-2064 194 646 December December NNP blog-dshr-org-2064 194 647 ( ( -LRB- blog-dshr-org-2064 194 648 2 2 CD blog-dshr-org-2064 194 649 ) ) -RRB- blog-dshr-org-2064 194 650 ► ► NFP blog-dshr-org-2064 194 651     _SP blog-dshr-org-2064 194 652 March March NNP blog-dshr-org-2064 194 653 ( ( -LRB- blog-dshr-org-2064 194 654 1 1 CD blog-dshr-org-2064 194 655 ) ) -RRB- blog-dshr-org-2064 194 656 ► ► NFP blog-dshr-org-2064 194 657     _SP blog-dshr-org-2064 194 658 January January NNP blog-dshr-org-2064 194 659 ( ( -LRB- blog-dshr-org-2064 194 660 5 5 CD blog-dshr-org-2064 194 661 ) ) -RRB- blog-dshr-org-2064 194 662 ► ► CD blog-dshr-org-2064 194 663     _SP blog-dshr-org-2064 194 664 2007 2007 CD blog-dshr-org-2064 194 665 ( ( -LRB- blog-dshr-org-2064 194 666 14 14 CD blog-dshr-org-2064 194 667 ) ) -RRB- blog-dshr-org-2064 194 668 ► ► NFP blog-dshr-org-2064 194 669     _SP blog-dshr-org-2064 194 670 December December NNP blog-dshr-org-2064 194 671 ( ( -LRB- blog-dshr-org-2064 194 672 1 1 CD blog-dshr-org-2064 194 673 ) ) -RRB- blog-dshr-org-2064 194 674 ► ► NFP blog-dshr-org-2064 194 675     _SP blog-dshr-org-2064 194 676 October October NNP blog-dshr-org-2064 194 677 ( ( -LRB- blog-dshr-org-2064 194 678 3 3 CD blog-dshr-org-2064 194 679 ) ) -RRB- blog-dshr-org-2064 194 680 ► ► NFP blog-dshr-org-2064 194 681     _SP blog-dshr-org-2064 194 682 September September NNP blog-dshr-org-2064 194 683 ( ( -LRB- blog-dshr-org-2064 194 684 1 1 CD blog-dshr-org-2064 194 685 ) ) -RRB- blog-dshr-org-2064 194 686 ► ► NFP blog-dshr-org-2064 194 687     _SP blog-dshr-org-2064 194 688 August August NNP blog-dshr-org-2064 194 689 ( ( -LRB- blog-dshr-org-2064 194 690 1 1 CD blog-dshr-org-2064 194 691 ) ) -RRB- blog-dshr-org-2064 194 692 ► ► NFP blog-dshr-org-2064 194 693     _SP blog-dshr-org-2064 194 694 July July NNP blog-dshr-org-2064 194 695 ( ( -LRB- blog-dshr-org-2064 194 696 2 2 CD blog-dshr-org-2064 194 697 ) ) -RRB- blog-dshr-org-2064 194 698 ► ► NFP blog-dshr-org-2064 194 699     _SP blog-dshr-org-2064 194 700 June June NNP blog-dshr-org-2064 194 701 ( ( -LRB- blog-dshr-org-2064 194 702 3 3 CD blog-dshr-org-2064 194 703 ) ) -RRB- blog-dshr-org-2064 194 704 ► ► NFP blog-dshr-org-2064 194 705     _SP blog-dshr-org-2064 194 706 May May NNP blog-dshr-org-2064 194 707 ( ( -LRB- blog-dshr-org-2064 194 708 1 1 CD blog-dshr-org-2064 194 709 ) ) -RRB- blog-dshr-org-2064 194 710 ► ► NFP blog-dshr-org-2064 194 711     _SP blog-dshr-org-2064 194 712 April April NNP blog-dshr-org-2064 194 713 ( ( -LRB- blog-dshr-org-2064 194 714 2 2 LS blog-dshr-org-2064 194 715 ) ) -RRB- blog-dshr-org-2064 194 716 LOCKSS LOCKSS NNP blog-dshr-org-2064 194 717 system system NN blog-dshr-org-2064 194 718 has have VBZ blog-dshr-org-2064 194 719 permission permission NN blog-dshr-org-2064 194 720 to to TO blog-dshr-org-2064 194 721 collect collect VB blog-dshr-org-2064 194 722 , , , blog-dshr-org-2064 194 723 preserve preserve VB blog-dshr-org-2064 194 724 , , , blog-dshr-org-2064 194 725 and and CC blog-dshr-org-2064 194 726 serve serve VB blog-dshr-org-2064 194 727 this this DT blog-dshr-org-2064 194 728 Archival Archival NNP blog-dshr-org-2064 194 729 Unit Unit NNP blog-dshr-org-2064 194 730 . . . blog-dshr-org-2064 195 1 Simple simple JJ blog-dshr-org-2064 195 2 theme theme NN blog-dshr-org-2064 195 3 . . . blog-dshr-org-2064 196 1 Powered power VBN blog-dshr-org-2064 196 2 by by IN blog-dshr-org-2064 196 3 Blogger Blogger NNP blog-dshr-org-2064 196 4 . . .