{"id":10171,"date":"2025-03-24T14:35:30","date_gmt":"2025-03-24T13:35:30","guid":{"rendered":"https:\/\/wsj-crypto.com\/?p=10171"},"modified":"2025-03-24T14:35:30","modified_gmt":"2025-03-24T13:35:30","slug":"navigating-the-balance-subjectivity-vs-exploitability","status":"publish","type":"post","link":"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/24\/navigating-the-balance-subjectivity-vs-exploitability\/","title":{"rendered":"Navigating the Balance: Subjectivity vs. Exploitability"},"content":{"rendered":"<p><\/p>\n<div id=\"\">\n<p class=\"chakra-text css-gi02ar\">A significant challenge intrinsic to various forms of consensus architectures is that while they can be engineered to be resilient against adversaries or collusions up to a certain threshold, should an attacker amass sufficient power, they remain fundamentally vulnerable. In a proof of work framework, if assailants possess less than 25% of mining capabilities while all other participants are non-colluding and rational, it can be demonstrated that proof of work is secure; conversely, if an attacker grows substantial enough to prevail, then the costs associated with the attack become negligible\u2014leading other miners to have a vested interest in supporting the assault. As we observed, SchellingCoin is <!-- --><a class=\"chakra-link css-ug8vf0\" href=\"https:\/\/blog.ethereum.org\/2015\/01\/28\/p-epsilon-attack\">exposed to a so-called P + epsilon attack<!-- --><\/a> when faced with an assailant willing to bribe a sufficiently large sum, and is easily manipulable by a controlling majority attacker much like in proof of work.<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">An inquiry that we might pose is whether there is a possibility of improvement. Especially if a pseudonymous cryptocurrency such as Bitcoin triumphs, and arguably even if it fails, there certainly exists <!-- --><i>some<!-- --><\/i> obscure venture capital sector prepared to invest the billions required to execute such assaults, provided they can confidently anticipate swift profits from their endeavors. Therefore, what we ideally need are cryptoeconomic mechanisms that are not solely <!-- --><em class=\"chakra-text css-0\">stable<!-- --><\/em>, in the sense that there is a considerable threshold of minimum &#8220;magnitude&#8221; an attacker must possess, but also <!-- --><em class=\"chakra-text css-0\">unexploitable<!-- --><\/em>\u2014although we can never fully ascertain all the <!-- --><i>extrinsic<!-- --><\/i> methods one could profit from assaulting a protocol, we aspire to ensure that the protocol provides no <!-- --><i>intrinsic<!-- --><\/i> potential for profit through an attack, and ideally imposes a maximally high inherent cost.<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">Certain types of protocols offer such potential; for instance, with proof of stake, we can penalize double-signing, and even in the event of a successful hostile fork, participants in the fork would still forfeit their deposits (note that to achieve this effectively, we need to incorporate a specific rule stating that forks that do not include evidence of double-signing for a designated duration are deemed invalid). Regrettably, for SchellingCoin-style mechanisms in their current state, such a possibility does not exist. There is no cryptographic means to distinguish between a SchellingCoin instance voting for the temperature in San Francisco being 4000000000&#8217;C because it genuinely is that hot, and one that votes for that temperature due to an assailant bribing individuals to do so. Voting-based DAOs, lacking a corresponding form of shareholder regulation, are susceptible to attacks where 51% of participants collude to appropriate all of the DAO&#8217;s assets. So what can be done?<!-- --><\/p>\n<p><!-- --><\/p>\n<h3 class=\"chakra-heading css-145upk7\" id=\"between-truth-and-lies\">Between Truth and Lies<!-- --><\/h3>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">A crucial characteristic shared by all these mechanisms is that they can be characterized as being <!-- --><em class=\"chakra-text css-0\">objective<!-- --><\/em>: the protocol&#8217;s functioning and consensus can be perpetuated at all times using merely nodes that possess nothing but the entire set of data published and the protocol&#8217;s rules themselves. There is no requisite &#8220;external information&#8221; (e.g., recent block hashes from block explorers, specifics regarding certain forking events, knowledge of external realities, reputation, etc.) necessary for securely interacting with the protocol. This contrasts with what we will refer to as <!-- --><em class=\"chakra-text css-0\">subjective<!-- --><\/em> mechanisms\u2014those that require external information to securely engage with them.<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">When multiple tiers of the <!-- --><a class=\"chakra-link css-ug8vf0\" href=\"https:\/\/blog.ethereum.org\/2014\/12\/31\/silos\">cryptoeconomic application stack<!-- --><\/a> exist, each tier can independently be objective or subjective: <!-- --><a target=\"_blank\" rel=\"noopener\" class=\"chakra-link css-ug8vf0\" href=\"http:\/\/codius.org\">Codius<!-- --><\/a> facilitates subjectively determined scoring of oracles for smart contract validation atop objective blockchains (as each user must individually ascertain whether a specific oracle is reliable), and Ripple&#8217;s decentralized exchange offers objective execution over a primarily subjective blockchain. Generally, however, cryptoeconomic protocols to date strive to be as objective as possible.<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">Objectivity has frequently been celebrated as one of the principal attributes of Bitcoin, and indeed it offers numerous advantages. However, simultaneously, it can also be a drawback. The core dilemma is as follows: as soon as you attempt to introduce something beyond the cryptoeconomic realm\u2014be it real-world currency rates, temperatures, events, reputations, or even time\u2014from the external world into the cryptoeconomic domain, you are trying to forge a connection where none previously existed. To illustrate this issue, contemplate the following two scenarios:<!-- --><\/p>\n<p><!-- --><\/p>\n<ul role=\"list\" class=\"css-1onhfjo\">\n<li class=\"css-cvpopp\">The truth is B, and the majority of participants are truthfully adhering to the standard protocol that determines the truth is B, but 20% are attackers or accepted a bribe.<\/li>\n<li class=\"css-cvpopp\">The truth is A, but 80% of participants are attackers or accepted a bribe to feign that the truth is B.<\/li>\n<\/ul>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">From the protocol&#8217;s standpoint, these two situations are entirely indistinguishable; between truth and lies, the protocol is exactly symmetrical. As a result, epistemic takeovers (the assailant persuading others that they&#8217;ve convinced everyone else to support an attack, potentially flipping an equilibrium at zero expense), P + epsilon assaults, profitable 51% attacks from extremely affluent individuals, and so forth, all come into play. Although one might initially conclude that objective systems, relying solely on information furnished by the protocol, are straightforward to analyze, this array of issues reveals that to a substantial extent, the reality is quite the opposite: objective protocols are susceptible to takeovers\u2014and potentially costless takeovers\u2014while standard economics and game theory are inadequately equipped to assess equilibrium shifts. The closest approximation we currently possess to a scientific discipline that attempts to analyze the complexity of equilibrium shifts is chaos theory, and it will be fascinating when crypto-protocols begin to be promoted as &#8220;chaos-theoretically guaranteed to safeguard your grandma&#8217;s funds.&#8221; <!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">Thus, we turn to subjectivity. The strength of subjectivity stems from the fact that concepts such as manipulation, takeovers, and deceit\u2014often undetectable or in some cases even indefinable within pure cryptography\u2014can be comprehended by the <!-- --><i>human community<!-- --><\/i> surrounding the protocol quite effectively. To illustrate how subjectivity may function in practice, let us jump directly to an example. The example provided here will outline a new, third, hypothetical form of blockchain or DAO governance, which can be instrumental in complementing <!-- --><a class=\"chakra-link css-ug8vf0\" href=\"https:\/\/blog.ethereum.org\/2014\/08\/21\/introduction-futarchy\">futarchy<!-- --><\/a> and democracy: subjectivocracy. Pure subjectivocracy is defined quite simply:<!-- --><\/p>\n<p><!-- --><\/p>\n<ol role=\"list\" class=\"css-13a5a39\">\n<li class=\"css-cvpopp\">If all parties consent, proceed with the collective decision.<!-- --><\/li>\n<li class=\"css-cvpopp\">In the event of a conflict, say between choice A and choice B, bifurcate the blockchain\/DAO into two branches, with one branch implementing choice A and the other executing choice B.<!-- --><\/li>\n<\/ol>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">All branches are permitted to coexist; it is left to the surrounding community to determine which branches they find significant. Subjectivocracy represents, in a manner, the ultimate non-coercive style of governance; no individual is ever compelled to endure a scenario where they do not get their preferred outcome, the sole caveat being that if your policy inclinations are unpopular, then you will find yourself on a branch with just a few others willing to engage with you. Perhaps, in some advanced society where nearly all resources have taken a digital form and everything tangible and beneficial is too inexpensive to meter, subjectivocracy could emerge as the favored governance method; but until that time arrives, the cryptoeconomy appears to be an ideal initial application.<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">As another illustration, we can also examine how to implement subjectivocracy in SchellingCoin. First, let us articulate our &#8220;objective&#8221; rendition of SchellingCoin for contrast:<!-- --><\/p>\n<p><!-- --><\/p>\n<ol role=\"list\" class=\"css-13a5a39\">\n<li class=\"css-cvpopp\">The SchellingCoin system is linked to a sub-currency.<!-- --><\/li>\n<li class=\"css-cvpopp\">Individuals have the capacity to &#8220;join&#8221; the system by acquiring units of the currency and placing them as a security deposit. The weight of participation correlates with the deposit&#8217;s magnitude, as is customary.<!-- --><\/li>\n<li class=\"css-cvpopp\">Individuals can pose a question to the system by paying a predetermined fee in that system&#8217;s currency.<!-- --><\/li>\n<li class=\"css-cvpopp\">For any given question, all participants within the system cast their votes either A or B.<!-- --><\/li>\n<li class=\"css-cvpopp\">Everyone who aligns with the majority receives a portion of the question fee; all those who voted against the majority gain nothing.<!-- --><\/li>\n<\/ol>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">It is important to note that, as referenced in the <!-- --><a class=\"chakra-link css-ug8vf0\" href=\"https:\/\/blog.ethereum.org\/2015\/01\/28\/p-epsilon-attack\">article on P + epsilon attacks<!-- --><\/a>, there exists a refinement by Paul Sztorc in which minority voters forfeit some of their tokens, and the more &#8220;disputed&#8221; a question becomes, the more tokens minority voters relinquish, even to the extent where at a 51\/49 split, minority voters lose <!-- --><em class=\"chakra-text css-0\">all<!-- --><\/em> their tokens to the majority. This effectively elevates the threshold for a P + epsilon attack. Nonetheless, raising the threshold is not entirely satisfactory; we are focused on achieving zero exploitability (once more, we formally define &#8220;exploitability&#8221; as &#8220;the protocol provides inherent opportunities for lucrative assaults&#8221;) altogether. Therefore, let\u2019s explore how subjectivity could assist. We will omit unchanged aspects:<!-- --><\/p>\n<p><!-- --><\/p>\n<ol role=\"list\" class=\"css-13a5a39\">\n<li class=\"css-cvpopp\">For any given question, all participants in the system cast votes either A or B.<!-- --><\/li>\n<li class=\"css-cvpopp\">If all parties consent, proceed with the collective decision and reward everyone.<!-- --><\/li>\n<li class=\"css-cvpopp\">In the event of a dispute, divide the system into two on-chain branches, where one branch behaves as if it chose A, rewarding all who voted A, and the other branch acts as if it chose B, rewarding all who voted B.<!-- --><\/li>\n<\/ol>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">Each version of the system possesses its own sub-currency and can be engaged with independently. It is up to the individual to choose which branch is more worthy of inquiry. The premise is that if a division occurs, the branch reflecting the correct answer will see an increased stake from those advocating for the truth, while the branch reflecting the incorrect answer will see an increase in stake from those misrepresenting, and users will hence favor asking questions in the branch where truth-seekers have a greater impact.<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">Upon close examination, this reveals itself as merely an ingenious formalization for a reputation system. The system primarily records the votes of all participants, allowing each user wishing to make an inquiry to review the history of each respondent and subsequently select which cohort of participants to approach. A rather mundane, conventional, and seemingly not particularly cryptoeconomic method of addressing the issue. Now, where do we head next?<!-- --><\/p>\n<p><!-- --><\/p>\n<h3 class=\"chakra-heading css-145upk7\" id=\"moving-to-practicality\">Transitioning To Practicality<!-- --><\/h3>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">Absolute subjectivocracy, as outlined previously, encounters two significant challenges. Firstly, in most practical scenarios, there are simply too many decisions to make for it to be feasible for users to determine which branch they wish to be on for each decision. To mitigate overwhelming cognitive burdens and prevent storage overload, it is critical for the collection of subjectively-determined decisions to be kept as minimal as achievable.<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">Secondly, if a particular user lacks a strong conviction regarding how a specific decision should be resolved (or alternatively, does not know what the rightful choice is), then they will struggle to identify which branch to follow. This challenge is especially pronounced within a category that may be termed &#8220;very uninformed users&#8221; (VUUs) &#8211; think not of Homer Simpson, but <!-- --><a target=\"_blank\" rel=\"noopener\" class=\"chakra-link css-ug8vf0\" href=\"http:\/\/gendal.me\/2013\/10\/23\/on-the-blockchain-nobody-knows-youre-a-fridge\/\">Homer Simpson&#8217;s refrigerator<!-- --><\/a>. Instances include internet-of-things\/smart property applications (e.g., SUVs), other cryptoeconomic mechanisms (e.g., Ethereum contracts, distinct blockchains, etc.), hardware devices governed by DAOs, independently functioning autonomous agents, etc. In summary, machines that possess (i) no means of obtaining updated social information, and (ii) no intelligence beyond simply adhering to a predetermined protocol. VUUs are present, and it would be beneficial to devise a method of managing them.<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">The initial problem is, surprisingly, essentially isomorphic to another well-known issue: the <!-- --><a class=\"chakra-link css-ug8vf0\" href=\"https:\/\/blog.ethereum.org\/2014\/09\/17\/scalability-part-1-building-top\">blockchain<!-- --><\/a> <!-- --><a class=\"chakra-link css-ug8vf0\" href=\"https:\/\/blog.ethereum.org\/2014\/10\/21\/scalability-part-2-hypercubes\">scalability<!-- --><\/a> <!-- --><a class=\"chakra-link css-ug8vf0\" href=\"https:\/\/blog.ethereum.org\/2014\/10\/21\/scalability-part-2-hypercubes\">problem<!-- --><\/a>. The task is precisely the same: we aim to achieve a level of strength analogous to all users performing a certain type of validation on a system, but without necessitating that degree of effort being exerted each time. And in blockchain scalability, a recognized solution exists: try utilizing less intense strategies, like randomly selected consensus groups, to address problems by default, relying on full validation only as a contingency to be employed if a warning has been triggered. Here, we will employ a similar strategy: aim to utilize traditional governance to settle relatively non-controversial matters, using subjectivocracy as a fallback and last-resort incentive.<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">Thus, let us define another alternative version of SchellingCoin:<!-- --><\/p>\n<p><!-- --><\/p>\n<ol role=\"list\" class=\"css-13a5a39\">\n<li class=\"css-cvpopp\">For any given inquiry, all participants in the system vote either A or B.<!-- --><\/li>\n<li class=\"css-cvpopp\">Everyone who voted with the majority receives a share of the question fee (which we will refer to as P); all who opposed the majority gain nothing.However, deposits become inactive for one hour following the conclusion of voting.<!-- --><\/li>\n<li class=\"css-cvpopp\">An individual has the capacity to place a significantly large deposit (let&#8217;s say, 50*P) to &#8220;sound the alarm&#8221; on a specific question that has already been voted on &#8211; effectively, a wager indicating &#8220;this was wrongly conducted&#8221;. If this occurs, the mechanism bifurcates into two on-chain branches, with one answer selected on one branch and the alternate answer on the other branch.<!-- --><\/li>\n<li class=\"css-cvpopp\">In the branch where the selected answer matches the initially voted answer, the alarm initiator forfeits the deposit. Conversely, in the other branch, the alarm initiator receives a reward of 2x the deposit, funded by the deposits of incorrect voters. Moreover, the rewards for all other respondents become more pronounced: &#8220;correct&#8221; respondents receive 5*P while &#8220;incorrect&#8221; respondents lose 10*P.<!-- --><\/li>\n<\/ol>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">Assuming an extremely generous premise whereby, in the case of a split, the incorrect branch rapidly diminishes and is disregarded, the (partial) payoff matrix begins to resemble the following (assuming the truth is A):<!-- --><\/p>\n<p><!-- --><\/p>\n<div class=\"css-ylxp7t\">\n<table role=\"table\" class=\"chakra-table css-nz8z8i\">\n<tbody node=\"[object Object]\" class=\"css-i54j9x\">\n<tr role=\"row\" class=\"css-0\">\n<td role=\"gridcell\" class=\"css-19nu0k5\"\/>\n<td role=\"gridcell\" class=\"css-19nu0k5\">You vote A<!-- --><\/td>\n<td role=\"gridcell\" class=\"css-19nu0k5\">You vote B<!-- --><\/td>\n<td role=\"gridcell\" class=\"css-19nu0k5\">You vote against consensus, sound the alarm<!-- --><\/td>\n<\/tr>\n<tr role=\"row\" class=\"css-0\">\n<td role=\"gridcell\" class=\"css-19nu0k5\">Others predominantly vote A<!-- --><\/td>\n<td role=\"gridcell\" class=\"css-19nu0k5\">P<!-- --><\/td>\n<td role=\"gridcell\" class=\"css-19nu0k5\">0<!-- --><\/td>\n<td role=\"gridcell\" class=\"css-19nu0k5\">-50P &#8211; 10P = -60P<!-- --><\/td>\n<\/tr>\n<tr role=\"row\" class=\"css-0\">\n<td role=\"gridcell\" class=\"css-19nu0k5\">Others primarily vote A, N &gt;= 1 others sound alarm<!-- --><\/td>\n<td role=\"gridcell\" class=\"css-19nu0k5\">5P<!-- --><\/td>\n<td role=\"gridcell\" class=\"css-19nu0k5\">-10P<!-- --><\/td>\n<td role=\"gridcell\" class=\"css-19nu0k5\">-10P &#8211; (50 \/ (N + 1)) * P<!-- --><\/td>\n<\/tr>\n<tr role=\"row\" class=\"css-0\">\n<td role=\"gridcell\" class=\"css-19nu0k5\">Others mainly vote B<!-- --><\/td>\n<td role=\"gridcell\" class=\"css-19nu0k5\">0<!-- --><\/td>\n<td role=\"gridcell\" class=\"css-19nu0k5\">P<!-- --><\/td>\n<td role=\"gridcell\" class=\"css-19nu0k5\">50P + 5P = 55P<!-- --><\/td>\n<\/tr>\n<tr role=\"row\" class=\"css-0\">\n<td role=\"gridcell\" class=\"css-19nu0k5\">Others mainly vote B, N &gt;= 1 others sound alarm<!-- --><\/td>\n<td role=\"gridcell\" class=\"css-19nu0k5\">5P<!-- --><\/td>\n<td role=\"gridcell\" class=\"css-19nu0k5\">-10P<!-- --><\/td>\n<td role=\"gridcell\" class=\"css-19nu0k5\">5P + (50 \/ (N + 1)) * P<!-- --><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">The strategy of voting <!-- --><i>with<!-- --><\/i> the consensus <!-- --><i>and<!-- --><\/i> sounding the alarm is evidently self-defeating and foolish, hence we will exclude it for conciseness. We can evaluate the payoff matrix employing a fairly conventional repeated-elimination strategy:<!-- --><\/p>\n<p><!-- --><\/p>\n<ol role=\"list\" class=\"css-13a5a39\">\n<li class=\"css-cvpopp\">If others predominantly vote B, then the strongest motivation is for you to sound the alarm.<!-- --><\/li>\n<li class=\"css-cvpopp\">If others mainly vote A, then the strongest motivation is for you to vote A.<!-- --><\/li>\n<li class=\"css-cvpopp\">Therefore, each individual will never choose B. Hence, it stands that everyone will opt for A, and thus everyone&#8217;s motivation is to vote A.<!-- --><\/li>\n<\/ol>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">It is noteworthy that, in contrast to the SchellingCoin game, there exists a distinct equilibrium here, at least if we presume that subjective resolution functions appropriately. Thus, by depending on essentially game theory from the users rather than the voters, we have managed to sidestep the rather unpleasant array of complexities associated with multi-equilibrium games and instead have a more lucid analysis.<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">Also, it is significant to point out that the &#8220;sound the alarm by placing a bet&#8221; procedure is distinct from other methods related to fallback protocols that have been previously referenced in articles here regarding scalability; this new system surpasses and streamlines those other methods and can also be utilized in scalability theory.<!-- --><\/p>\n<p><!-- --><\/p>\n<h3 class=\"chakra-heading css-145upk7\" id=\"the-public-function-of-markets\">The Public Function of Markets<!-- --><\/h3>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">Now, let us reintroduce our cars, blockchains, and autonomous agents into the discussion. The reason why Bitcoin&#8217;s objectivity is so esteemed is, to some extent, precisely because this objectivity renders it highly suitable for such applications. Therefore, if we aim to develop a protocol that competes effectively in this arena, we must also cater to these &#8220;very naive users&#8221; among us.<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">Enter markets. The fundamental insight behind Hayek&#8217;s specific variant of libertarianism in the 1940s, and <!-- --><a target=\"_blank\" rel=\"noopener\" class=\"chakra-link css-ug8vf0\" href=\"http:\/\/mason.gmu.edu\/~rhanson\/futarchy.html\">Robin Hanson&#8217;s conception of futarchy<!-- --><\/a> half a century later, is the notion that markets are not solely present to connect buyers and sellers, but also to furnish a public service of information. A prediction market concerning a data point (e.g., GDP, unemployment, etc.) reveals the insights regarding what the market anticipates the value of that data point will be at some future juncture, and a market based on a commodity or service or token conveys to interested parties, policymakers, and mechanism designers how much the public appreciates that specific commodity or service or token. Consequently, markets can be perceived as a complement to SchellingCoin in that they, similar to SchellingCoin, serve as a conduit between the digital domain and the &#8220;real&#8221; realm &#8211; in this scenario, a conduit that illustrates just how much the real world values a given subject.<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">So, how does this secondary &#8220;public function&#8221; of markets associate here? In essence, the response is quite straightforward. Suppose there exists a SchellingCoin mechanism of the last type, and following a specific question two branches emerge. One branch asserts that the temperature in San Francisco is 20&#8217;C; the other branch claims that the temperature is 4000000000&#8217;C. As a VSU, what do you perceive? Well, let&#8217;s examine what the market perceives. On one side, you have a branch where the larger portion of the internal currency is governed by truth-tellers. On the opposing side, you have a branch where the majority is controlled by deceivers. Well, guess which of the two currencies commands a higher price in the market&#8230;<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">In cryptoeconomic terms, what transpired here? In simple terms, the market translated the cognitive prowess of the insightful users within what ultimately is a subjective protocol into a pseudo-objective signal that enables the VSUs to align with the correct branch as well. It is important to note that the protocol itself is not objective; even if the attacker successfully manipulates the market for a brief duration and significantly elevates the price of token B, users will still maintain a higher valuation for token A, and when the manipulator relinquishes control, token A will revert to being the dominant option.<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">Now, what are the resilience attributes of this market against an attack? As discussed in the <!-- --><a target=\"_blank\" rel=\"noopener\" class=\"chakra-link css-ug8vf0\" href=\"https:\/\/www.youtube.com\/watch?v=Tb-6ikXdOzE\">Hanson\/Moldbug debate on futarchy<!-- --><\/a>, in an ideal scenario, a market will consistently provide the accurate price for a token as long as the economic strength of the honestly participating users surpasses the economic weight of any specific colluding group of attackers. Should certain attackers artificially inflate the price, a motivation arises forother participants to exchange their tokens and for outsiders to come in and short it, in both instances generating an anticipated profit while simultaneously aiding in driving the price right back down to the accurate value. In reality, manipulation pressure does have some influence, but a complete takeover is only achievable if the manipulator can outbid all others combined. And even if the attacker does prevail, they pay a hefty price for it, acquiring tokens that ultimately become nearly worthless once the attack concludes and the fork with the correct result reasserts itself as the most valuable fork in the market.<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">Certainly, the preceding is merely a rough outline of how quasi-subjective SchellingCoin might function; in actuality, several enhancements would be necessary to deter asking ambiguous or unethical inquiries, managing linear instead of merely binary bets, and optimizing the non-exploitability characteristic. Nevertheless, if P + epsilon assaults, profit-driven 51% assaults, or any other type of attack ever truly become an issue with objective SchellingCoin mechanisms, the fundamental model remains ready as a substitute.<!-- --><\/p>\n<p><!-- --><\/p>\n<h3 class=\"chakra-heading css-145upk7\" id=\"listening-to-markets-and-proof-of-work\">Listening to Markets and Proof of Work<!-- --><\/h3>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">Previously in this article, and in my initial <!-- --><a class=\"chakra-link css-ug8vf0\" href=\"https:\/\/blog.ethereum.org\/2014\/03\/28\/schellingcoin-a-minimal-trust-universal-data-feed\">post on SchellingCoin<!-- --><\/a>, I suggested a form of isomorphism between SchellingCoin and proof of work &#8211; in the original post reasoning that since proof of work is effective, so will SchellingCoin, and furthermore, because SchellingCoin presents issues, so does proof of work. Here, let\u2019s delve into this isomorphism further in another direction: if SchellingCoin can be rescued through subjectivity, then perhaps proof of work can be as well.<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">The essential argument is this: proof of work, at its essence, can be perceived in two distinct manners. One perception of proof of work is as a SchellingCoin competition, an objective protocol where the participants that cast their votes with the majority receive 25 BTC while everyone else receives nothing. The alternative perspective, however, is to view proof of work as a sort of constant ongoing &#8220;market&#8221; between a token and a resource that can be measured entirely objectively: computational power. Proof of work represents an endless chance to exchange computational power for currency, and the greater the demand for acquiring units in a currency, the more effort will be exerted on its blockchain. &#8220;Listening&#8221; to this market simply consists of verifying and calculating the total amount of work.<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">Considering the description in the earlier section regarding how our improved version of SchellingCoin may function, you might have been prompted to suggest a similar methodology for cryptocurrency, whereby if a cryptocurrency undergoes a fork, one can observe the price of both forks on an exchange, and if the exchange assigns a significantly higher price to one fork, it suggests that fork is legitimate. Nevertheless, such a methodology possesses a flaw: ascertaining the authenticity of a crypto-fiat exchange is subjective, and thus this issue lies beyond the scope of a VSU. However, utilizing proof of work as our &#8220;exchange,&#8221; we can actually advance much further.<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">Here lies the equivalence: <!-- --><a class=\"chakra-link css-ug8vf0\" href=\"https:\/\/blog.ethereum.org\/2014\/10\/03\/slasher-ghost-developments-proof-stake\">exponential subjective scoring<!-- --><\/a>. In ESS, the &#8220;score&#8221; that a client attributes to a fork relies not just on the total amount of work done on the fork, but also on the timing of the fork&#8217;s emergence; forks that emerge later are explicitly penalized. Consequently, the group of always-online users can recognize that a particular fork appeared later, and thus that it constitutes a hostile attack, which leads them to abstain from mining on it even if its proof of work chain accumulates a greater total work. Their motivation to do this is straightforward: they anticipate that the assailant will eventually surrender, and thus they will persist in mining and eventually surpass the attacker, reinstating their fork as the universally acknowledged longest one; therefore, mining on the original fork has an expected value of 25 BTC while mining on the attacking fork holds an expected value of zero.<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">VSUs that are offline at the moment of a fork will merely assess the total proof of work accomplished; this tactic is analogous to the &#8220;listen to the child with the superior price&#8221; strategy in our iteration of SchellingCoin. During an assault, such VSUs may, of course, be temporarily deceived, but ultimately, the original fork will prevail and so the assailant will have substantially paid for their treachery. Thus, the subjectivity once more renders the mechanism less exploitable.<!-- --><\/p>\n<p><!-- --><\/p>\n<h3 class=\"chakra-heading css-145upk7\" id=\"conclusion\">Conclusion<!-- --><\/h3>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">Ultimately, what we observe is that subjectivity, far from being an adversary of rigorous analysis, actually simplifies many forms of game-theoretic examination of cryptoeconomic protocols considerably. However, should this type of subjective algorithm design gain acceptance as the most secure method, it carries profound implications. Primarily, <!-- --><a class=\"chakra-link css-ug8vf0\" href=\"https:\/\/blog.ethereum.org\/2014\/11\/20\/bitcoin-maximalism-currency-platform-network-effects\">Bitcoin maximalism<!-- --><\/a>, or any form of single-cryptocurrency maximalism in general, cannot endure. Subjective algorithm design inherently demands a type of loose coupling, where the higher-level mechanism does not truly control any assets of value belonging to a lower-level protocol; this condition is essential to permit higher-level mechanism instances to replicate themselves.<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">In fact, to enable the VSU protocol to function, every mechanism must encompass its own currency that would fluctuate with its perceived utility, necessitating thousands or even millions of &#8220;coins&#8221; to exist. Conversely, it may be feasible to specify a very particular number of mechanisms that indeed need to be subjective &#8211; perhaps basic consensus on <!-- --><a class=\"chakra-link css-ug8vf0\" href=\"https:\/\/blog.ethereum.org\/2014\/11\/13\/scalability-part-3-metacoin-history-multichain\">block data availability validation and timestamping<!-- --><\/a> and consensus on facts, while everything else can be constructed objectively on top. As is frequently the case, we have not yet witnessed significant actual attacks occurring, and thus it may very well be a decade before anything akin to a final judgment is required.<!-- --><\/p>\n<\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/blog.ethereum.org\/en\/2015\/02\/14\/subjectivity-exploitability-tradeoff\">Source link<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A significant challenge intrinsic to various forms of consensus architectures is that while they can be engineered to be resilient against adversaries or collusions up to a certain threshold, should an attacker amass sufficient power, they remain fundamentally vulnerable. In a proof of work framework, if assailants possess less than 25% of mining capabilities while<\/p>\n","protected":false},"author":3,"featured_media":8282,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23],"tags":[1832],"class_list":{"0":"post-10171","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-ethereum","8":"tag-return-a-list-of-comma-separated-tags-from-this-title-the-subjectivity-exploitability-tradeoff"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Navigating the Balance: Subjectivity vs. Exploitability - WSJ-Crypto<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/24\/navigating-the-balance-subjectivity-vs-exploitability\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Navigating the Balance: Subjectivity vs. Exploitability - WSJ-Crypto\" \/>\n<meta property=\"og:description\" content=\"A significant challenge intrinsic to various forms of consensus architectures is that while they can be engineered to be resilient against adversaries or collusions up to a certain threshold, should an attacker amass sufficient power, they remain fundamentally vulnerable. In a proof of work framework, if assailants possess less than 25% of mining capabilities while\" \/>\n<meta property=\"og:url\" content=\"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/24\/navigating-the-balance-subjectivity-vs-exploitability\/\" \/>\n<meta property=\"og:site_name\" content=\"WSJ-Crypto\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-24T13:35:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/wsj-crypto.com\/wp-content\/uploads\/2025\/02\/eth-org.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2100\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"wsjcrypto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"wsjcrypto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"19 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/24\/navigating-the-balance-subjectivity-vs-exploitability\/\",\"url\":\"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/24\/navigating-the-balance-subjectivity-vs-exploitability\/\",\"name\":\"Navigating the Balance: Subjectivity vs. Exploitability - WSJ-Crypto\",\"isPartOf\":{\"@id\":\"https:\/\/wsj-crypto.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/24\/navigating-the-balance-subjectivity-vs-exploitability\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/24\/navigating-the-balance-subjectivity-vs-exploitability\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/wsj-crypto.com\/wp-content\/uploads\/2025\/02\/eth-org.jpeg\",\"datePublished\":\"2025-03-24T13:35:30+00:00\",\"author\":{\"@id\":\"https:\/\/wsj-crypto.com\/#\/schema\/person\/88a93723b30416db1a352d5a0096c4a7\"},\"breadcrumb\":{\"@id\":\"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/24\/navigating-the-balance-subjectivity-vs-exploitability\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/24\/navigating-the-balance-subjectivity-vs-exploitability\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/24\/navigating-the-balance-subjectivity-vs-exploitability\/#primaryimage\",\"url\":\"https:\/\/wsj-crypto.com\/wp-content\/uploads\/2025\/02\/eth-org.jpeg\",\"contentUrl\":\"https:\/\/wsj-crypto.com\/wp-content\/uploads\/2025\/02\/eth-org.jpeg\",\"width\":2100,\"height\":900},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/24\/navigating-the-balance-subjectivity-vs-exploitability\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/wsj-crypto.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Navigating the Balance: Subjectivity vs. Exploitability\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/wsj-crypto.com\/#website\",\"url\":\"https:\/\/wsj-crypto.com\/\",\"name\":\"WSJ-Crypto\",\"description\":\"Just Another Crypto News Website\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/wsj-crypto.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/wsj-crypto.com\/#\/schema\/person\/88a93723b30416db1a352d5a0096c4a7\",\"name\":\"wsjcrypto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/wsj-crypto.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/86fe8af82ea089646d6639ca2f87e0243d8688d957bd8e3ec22ec3c457cc16d4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/86fe8af82ea089646d6639ca2f87e0243d8688d957bd8e3ec22ec3c457cc16d4?s=96&d=mm&r=g\",\"caption\":\"wsjcrypto\"},\"url\":\"https:\/\/wsj-crypto.com\/index.php\/author\/wsjcrypto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Navigating the Balance: Subjectivity vs. Exploitability - WSJ-Crypto","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/24\/navigating-the-balance-subjectivity-vs-exploitability\/","og_locale":"it_IT","og_type":"article","og_title":"Navigating the Balance: Subjectivity vs. Exploitability - WSJ-Crypto","og_description":"A significant challenge intrinsic to various forms of consensus architectures is that while they can be engineered to be resilient against adversaries or collusions up to a certain threshold, should an attacker amass sufficient power, they remain fundamentally vulnerable. In a proof of work framework, if assailants possess less than 25% of mining capabilities while","og_url":"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/24\/navigating-the-balance-subjectivity-vs-exploitability\/","og_site_name":"WSJ-Crypto","article_published_time":"2025-03-24T13:35:30+00:00","og_image":[{"width":2100,"height":900,"url":"https:\/\/wsj-crypto.com\/wp-content\/uploads\/2025\/02\/eth-org.jpeg","type":"image\/jpeg"}],"author":"wsjcrypto","twitter_card":"summary_large_image","twitter_misc":{"Scritto da":"wsjcrypto","Tempo di lettura stimato":"19 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/24\/navigating-the-balance-subjectivity-vs-exploitability\/","url":"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/24\/navigating-the-balance-subjectivity-vs-exploitability\/","name":"Navigating the Balance: Subjectivity vs. Exploitability - WSJ-Crypto","isPartOf":{"@id":"https:\/\/wsj-crypto.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/24\/navigating-the-balance-subjectivity-vs-exploitability\/#primaryimage"},"image":{"@id":"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/24\/navigating-the-balance-subjectivity-vs-exploitability\/#primaryimage"},"thumbnailUrl":"https:\/\/wsj-crypto.com\/wp-content\/uploads\/2025\/02\/eth-org.jpeg","datePublished":"2025-03-24T13:35:30+00:00","author":{"@id":"https:\/\/wsj-crypto.com\/#\/schema\/person\/88a93723b30416db1a352d5a0096c4a7"},"breadcrumb":{"@id":"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/24\/navigating-the-balance-subjectivity-vs-exploitability\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/wsj-crypto.com\/index.php\/2025\/03\/24\/navigating-the-balance-subjectivity-vs-exploitability\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/24\/navigating-the-balance-subjectivity-vs-exploitability\/#primaryimage","url":"https:\/\/wsj-crypto.com\/wp-content\/uploads\/2025\/02\/eth-org.jpeg","contentUrl":"https:\/\/wsj-crypto.com\/wp-content\/uploads\/2025\/02\/eth-org.jpeg","width":2100,"height":900},{"@type":"BreadcrumbList","@id":"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/24\/navigating-the-balance-subjectivity-vs-exploitability\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/wsj-crypto.com\/"},{"@type":"ListItem","position":2,"name":"Navigating the Balance: Subjectivity vs. Exploitability"}]},{"@type":"WebSite","@id":"https:\/\/wsj-crypto.com\/#website","url":"https:\/\/wsj-crypto.com\/","name":"WSJ-Crypto","description":"Just Another Crypto News Website","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/wsj-crypto.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Person","@id":"https:\/\/wsj-crypto.com\/#\/schema\/person\/88a93723b30416db1a352d5a0096c4a7","name":"wsjcrypto","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/wsj-crypto.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/86fe8af82ea089646d6639ca2f87e0243d8688d957bd8e3ec22ec3c457cc16d4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/86fe8af82ea089646d6639ca2f87e0243d8688d957bd8e3ec22ec3c457cc16d4?s=96&d=mm&r=g","caption":"wsjcrypto"},"url":"https:\/\/wsj-crypto.com\/index.php\/author\/wsjcrypto\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/posts\/10171","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/comments?post=10171"}],"version-history":[{"count":2,"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/posts\/10171\/revisions"}],"predecessor-version":[{"id":10173,"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/posts\/10171\/revisions\/10173"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/media\/8282"}],"wp:attachment":[{"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/media?parent=10171"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/categories?post=10171"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/tags?post=10171"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}