{"componentChunkName":"component---src-templates-post-js","path":"/writing/bitcoin-asic","result":{"data":{"markdownRemark":{"frontmatter":{"title":"Bitcoin Security Part III: ASIC Edition","date":"Oct. 01, 2018","twitterLink":"https://twitter.com/jordanmmck/status/1046780961562624000","coverImageUrl":"/img/covers/bitcoin-asic.jpg","description":"This is part III in a series of posts (which was not intended to be a series) on the consequences of Bitcoin's declining block rewards to the security of the network..."},"timeToRead":10,"wordCount":{"words":1868},"html":"<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto;  max-width: 900px;\"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 69.33333333333334%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"George Dmitriev\"\n        title=\"George Dmitriev\"\n        src=\"/static/c9abdffb154a973a90170c1c7d07fbb5/8e1fc/bitcoin-asic.jpg\"\n        srcset=\"/static/c9abdffb154a973a90170c1c7d07fbb5/20e5d/bitcoin-asic.jpg 450w,\n/static/c9abdffb154a973a90170c1c7d07fbb5/8e1fc/bitcoin-asic.jpg 900w\"\n        sizes=\"(max-width: 900px) 100vw, 900px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>[This post was first published on <a href=\"https://medium.com/coinmonks/bitcoin-security-budget-asic-edition-59a8323f9529\">Medium</a>].</p>\n<p>This is <strong>part III</strong> in a series of posts (which was not intended to be a series) on the consequences of Bitcoin’s declining block rewards to the security of the network.</p>\n<p><strong>Part I: <a href=\"https://jordanmmck.com/long/bitcoin-security\">Bitcoin Security: a Negative Exponential</a></strong>. <strong><a href=\"https://twitter.com/jordanmmck/status/1034834965127557120\">Tweetstorm</a></strong>.</p>\n<p><strong>Part II: <a href=\"https://jordanmmck.com/long/bitcoin-chart\">Bitcoin Security in One Chart</a></strong>. <strong><a href=\"https://twitter.com/jordanmmck/status/1042074859977592833\">Tweetstorm</a></strong>.</p>\n<p>In the first post I argued that the attack cost (and therefore security) of proof-of-work systems like Bitcoin is ultimately determined by miner revenue — the “security budget”.</p>\n<p>To illustrate this relationship I used a simplified model-cryptocurrency with constant miner pay-out and no ASICs. I <em>did</em> include a second, shorter example <em>with</em> ASICs, but I didn’t spend much time on it.</p>\n<p>It seemed to me that ASICs change the attack cost <em>profile</em> (by “front-loading” attack cost) but that security budget still <a href=\"https://en.wikipedia.org/wiki/Asymptotic_analysis\">dominates</a> the attack cost equation — which is all that mattered for my argument.</p>\n<p>But, to close out the trilogy I felt I needed to go down this avenue and find out <em>for sure</em> whether attack cost is ultimately determined by security budget — ASICs or no ASICs!</p>\n<h2 id=\"initial-hardware\" style=\"position:relative;\"><a href=\"#initial-hardware\" aria-label=\"initial hardware permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" height=\"20\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"20\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Initial Hardware</h2>\n<p>So you want to 51% attack Bitcoin (or any ASIC-mined PoW system). First you need to buy the hardware. How much will that cost?</p>\n<p>Suppose the network is producing 10TH/s. Worst-case scenario you must also buy 10TH/s worth of hardware, then you have 50% of total hash power. In reality less efficient miners will drop-out as you add hash power and kill their margins, so in the best-case you could buy as little as ~5TH/s.</p>\n<p>But we care about <em>cost</em>, not absolute hash power. How do miners decide how much capital should be tied-up in ASICs at any given time?</p>\n<h3 id=\"present-value-of-income-stream\" style=\"position:relative;\"><a href=\"#present-value-of-income-stream\" aria-label=\"present value of income stream permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" height=\"20\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"20\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Present Value of Income Stream</h3>\n<p>Miners are funded by the income stream that the protocol provides (block rewards + tx fees). They care about the <em>dollar</em> amount of this stream. This is the <strong>security budget</strong> that I talked about in the previous posts.</p>\n<p>The magnitude ($/time) of this stream is determined by coin price, inflation rate, and block space demand. Miners have no impact on the income stream unless they affect the factors mentioned — they simply split the income stream (whatever it is) based on their respective hash power contribution.</p>\n<p>Miners buy ASICs in order to capture some sliver of the income stream. If they are rational they do not spend more on hardware than the <strong>present value</strong> of the <em>expected</em> income stream sliver (costs deducted) that they plan to capture with the hardware.</p>\n<p><strong>Note</strong>: These income streams and cost streams are <em>projections</em> into the future. Expected profit from these streams must be heavily discounted to account for various risk-factors and uncertainties (see appendix).</p>\n<h3 id=\"present-value-equation\" style=\"position:relative;\"><a href=\"#present-value-equation\" aria-label=\"present value equation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" height=\"20\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"20\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Present Value Equation</h3>\n<p>The present value of some income stream can be determined with the… <a href=\"https://faculty.atu.edu/mfinan/2243/business65.pdf\">present value equation</a>:</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto;  max-width: 310px;\"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 31.61290322580645%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"present value equation\"\n        title=\"present value equation\"\n        src=\"/static/a4746740c8b72c444a043b1cc34176ad/ea106/bitcoin-asic-2.jpg\"\n        srcset=\"/static/a4746740c8b72c444a043b1cc34176ad/ea106/bitcoin-asic-2.jpg 310w\"\n        sizes=\"(max-width: 310px) 100vw, 310px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p><strong>Variables</strong>: <code class=\"language-text\">PV</code> is the present value of the income stream. <code class=\"language-text\">S(t)</code> is the income stream. The limits of integration, <code class=\"language-text\">O</code> and <code class=\"language-text\">M</code>, define the time-span, and <code class=\"language-text\">r</code> is the going interest rate (5% or whatever).</p>\n<p>The equation tells how much money you would need <em>now</em>, such that by the end of some period, you were just as well-off as someone who had the income stream — it really does give the <em><strong>present value</strong></em> of the income stream.</p>\n<p>Applying this equation to the miner situation we get:</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto;  max-width: 270px;\"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 36.29629629629629%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"bitcoin asic 3\"\n        title=\"bitcoin asic 3\"\n        src=\"/static/18860f2798eb1c8cdea1e6d024ae266f/6f81f/bitcoin-asic-3.jpg\"\n        srcset=\"/static/18860f2798eb1c8cdea1e6d024ae266f/6f81f/bitcoin-asic-3.jpg 270w\"\n        sizes=\"(max-width: 270px) 100vw, 270px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p><strong>Variables</strong>: <code class=\"language-text\">h</code> is how much the miner spends on hardware. The upper limit of integration, <code class=\"language-text\">th</code> is the profitable life-span of the hardware. <code class=\"language-text\">s(t)</code> is the expected income stream. <code class=\"language-text\">r</code> is the usual interest rate.</p>\n<p>The income stream that the miner cares about in this calculation is actually the income stream <em>after</em> expenses. If <code class=\"language-text\">p(t)</code> is the expected operational cost (electricity, rent, etc) then we get:</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto;  max-width: 376px;\"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 26.063829787234045%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,/9j/2wBDABALDA4MChAODQ4SERATGCgaGBYWGDEjJR0oOjM9PDkzODdASFxOQERXRTc4UG1RV19iZ2hnPk1xeXBkeFxlZ2P/2wBDARESEhgVGC8aGi9jQjhCY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2P/wgARCAAFABQDASIAAhEBAxEB/8QAFgABAQEAAAAAAAAAAAAAAAAAAAEF/8QAFAEBAAAAAAAAAAAAAAAAAAAAAP/aAAwDAQACEAMQAAAB3KAH/8QAFxAAAwEAAAAAAAAAAAAAAAAAAAERMf/aAAgBAQABBQJ7GQ//xAAUEQEAAAAAAAAAAAAAAAAAAAAQ/9oACAEDAQE/AT//xAAUEQEAAAAAAAAAAAAAAAAAAAAQ/9oACAECAQE/AT//xAAVEAEBAAAAAAAAAAAAAAAAAAAAMf/aAAgBAQAGPwKqr//EABkQAAMAAwAAAAAAAAAAAAAAAAABESExUf/aAAgBAQABPyFHCo0Zldn/2gAMAwEAAgADAAAAEAPP/8QAFBEBAAAAAAAAAAAAAAAAAAAAEP/aAAgBAwEBPxA//8QAFBEBAAAAAAAAAAAAAAAAAAAAEP/aAAgBAgEBPxA//8QAHBABAAICAwEAAAAAAAAAAAAAAQAhEWExQVHR/9oACAEBAAE/EFdIb3iOpc0XF2hPMHyf/9k='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"bitcoin asic 4\"\n        title=\"bitcoin asic 4\"\n        src=\"/static/92ddc6940d7e3e46c773b4d0bd258a06/80d0c/bitcoin-asic-4.jpg\"\n        srcset=\"/static/92ddc6940d7e3e46c773b4d0bd258a06/80d0c/bitcoin-asic-4.jpg 376w\"\n        sizes=\"(max-width: 376px) 100vw, 376px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>So, miners buy a unit of hardware if they think that the present value of the expected, risk-discounted, income stream that the unit will capture — minus the costs to run it — exceeds the cost of the hardware.</p>\n<h3 id=\"summed-across-all-miners\" style=\"position:relative;\"><a href=\"#summed-across-all-miners\" aria-label=\"summed across all miners permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" height=\"20\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"20\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Summed Across all Miners</h3>\n<p>Each miner does this calculation individually — they claim a fraction of the overall income stream (security budget) by spending <em>less than</em> the present value of the stream fraction.</p>\n<p>When you sum this behaviour across <em>all</em> miners you sum <em>all</em> fractions of the larger income stream, <em>and</em> you sum the respective hardware-spends for each fraction.</p>\n<p><strong>The result of this summation is that the miners collectively spend on hardware less than the risk-adjusted present value of the total expected income stream — the security budget!</strong></p>\n<p>How could it be otherwise? If the miner-collective were consistently* spending <em>more</em> capturing the income stream than the present value of the income stream they would effectively be losing money — which can’t last.</p>\n<p>But, suppose miners overestimate the income stream and spend more on hardware than they should, what is the value of this hardware?</p>\n<p><strong>The value of the hardware at any point in time is defined as the present value of the income stream captured by the hardware!</strong> Regardless of what the miners <em>paid</em> for the hardware, it is now <em>worth</em> exactly the present value of whatever income it’s expected to capture.</p>\n<p>If you wanted to buy some of that hardware from the miners you would not pay what <em>they</em> paid for it. You would not pay a penny more than <code class=\"language-text\">PV</code> of what it is going to earn for you. Likewise, ASIC sellers will not be able to sell hardware for more than <code class=\"language-text\">PV</code> of what they are expected to capture…</p>\n<p>So the total hardware value** for the whole network, <code class=\"language-text\">H</code> is capped by the projected security budget, <code class=\"language-text\">S(t)</code> minus operational cost <code class=\"language-text\">P(t)</code>. <code class=\"language-text\">tH</code> is the average hardware lifespan:</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto;  max-width: 399px;\"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 24.56140350877193%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"bitcoin asic 5\"\n        title=\"bitcoin asic 5\"\n        src=\"/static/3c65d11a0db82c3960b84b2972a390a9/01983/bitcoin-asic-5.jpg\"\n        srcset=\"/static/3c65d11a0db82c3960b84b2972a390a9/01983/bitcoin-asic-5.jpg 399w\"\n        sizes=\"(max-width: 399px) 100vw, 399px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>* <em>Hardware spend is based on a projection of the future. If the projection is wrong miners can over-spend or under-spend on hardware. This uncertainty is factored into spend however, and will tend to smooth out over time. See appendix.</em></p>\n<p>** <em>Assuming hardware is upgraded continuously the average unit will be middle-aged, so <code class=\"language-text\">tH</code> may be too wide — overestimating cost. On the other hand newer units may represent majority hash power, and it’s possible a new hardware release just occurred and most units are very young.</em></p>\n<h3 id=\"what-if-asics-stop-advancing\" style=\"position:relative;\"><a href=\"#what-if-asics-stop-advancing\" aria-label=\"what if asics stop advancing permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" height=\"20\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"20\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What if ASICs Stop Advancing</h3>\n<p>If ASIC advancement plateaus then miners only need to buy hardware once, then can mine forever. <code class=\"language-text\">tH</code> is then infinite. Does <code class=\"language-text\">H</code> get huge? Does this break the bound?</p>\n<p>No. When <code class=\"language-text\">tH</code> is infinite the expression converges:</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto;  max-width: 242px;\"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 38.84297520661158%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"bitcoin asic 6\"\n        title=\"bitcoin asic 6\"\n        src=\"/static/b72be73e9f61e2ee75daef775427a8de/46713/bitcoin-asic-6.jpg\"\n        srcset=\"/static/b72be73e9f61e2ee75daef775427a8de/46713/bitcoin-asic-6.jpg 242w\"\n        sizes=\"(max-width: 242px) 100vw, 242px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h2 id=\"operational--upgrade-costs\" style=\"position:relative;\"><a href=\"#operational--upgrade-costs\" aria-label=\"operational  upgrade costs permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" height=\"20\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"20\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Operational &#x26; Upgrade Costs</h2>\n<p>So we’ve got a cap on the hardware cost.</p>\n<p>Now we need to consider the cost of running all that hardware, and the cost of upgrading the hardware throughout the attack*.</p>\n<p>I think I found an exact description of total upgrade cost (see appendix), but couldn’t find the math to express it. Instead I’m using <code class=\"language-text\">S*(t)</code> — the <em>actual</em> total miner revenue paid out over time (the previous <code class=\"language-text\">S</code> was <em>projected</em> revenue) — as a rough bound on upgrade cost <em>and</em> operational cost (electricity etc).</p>\n<p>Miners won’t spend more money running their hardware than they earn. They <em>could</em> spend a lot on hardware though. So, for short time frames total expenditure could exceed total revenue, but this will become smoothed out over time — taking at most one hardware refresh period — revenue <em>must</em> exceed expenditures for long time frames.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto;  max-width: 167px;\"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 57.48502994011976%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"bitcoin asic 7\"\n        title=\"bitcoin asic 7\"\n        src=\"/static/d1d3fc53d1a1450d977dd04d3458dde8/d0ba8/bitcoin-asic-7.jpg\"\n        srcset=\"/static/d1d3fc53d1a1450d977dd04d3458dde8/d0ba8/bitcoin-asic-7.jpg 167w\"\n        sizes=\"(max-width: 167px) 100vw, 167px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p><strong>Variables</strong>: <code class=\"language-text\">S*(t)</code> is actual total revenue. <code class=\"language-text\">t0</code> is when the attack starts, <code class=\"language-text\">tA</code> is when the attack ends.</p>\n<p>But if the attacker has half the hash power, don’t they get half the revenue — half of <code class=\"language-text\">S*(t)</code>? If so, honest miners would have <em>half</em> of <code class=\"language-text\">S*(t)</code> to spend on operations and upgrades. Then the attacker could match their spend with his “attack-income”. Then this whole term would become zero.</p>\n<p>I’m not sure how this would actually play out, but I don’t think this income can be <em>counted on</em>, and it doesn’t matter for my argument. So, I’ll assume the attacker gets no income and use the safe upper bound of <code class=\"language-text\">S*(t)</code>.</p>\n<p>* <em>It seems unlikely that miners would upgrade hardware while being attacked — difficulty is now much higher, and long-term confidence is low — but I’m assuming worst case for the attacker.</em></p>\n<h2 id=\"final-expression\" style=\"position:relative;\"><a href=\"#final-expression\" aria-label=\"final expression permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" height=\"20\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"20\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Expression</h2>\n<p>Combining the initial hardware investment cost (the first integral) with the operational and upgrade cost (second integral) we get:</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto;  max-width: 899px;\"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 16%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"bitcoin asic 8\"\n        title=\"bitcoin asic 8\"\n        src=\"/static/daab0d119ce4e844c2d6a6e9970993b9/b2161/bitcoin-asic-8.jpg\"\n        srcset=\"/static/daab0d119ce4e844c2d6a6e9970993b9/20e5d/bitcoin-asic-8.jpg 450w,\n/static/daab0d119ce4e844c2d6a6e9970993b9/b2161/bitcoin-asic-8.jpg 899w\"\n        sizes=\"(max-width: 899px) 100vw, 899px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" height=\"20\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"20\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>So the equation has <code class=\"language-text\">S</code>, <code class=\"language-text\">S*</code>, <code class=\"language-text\">P</code>, <code class=\"language-text\">r</code>, and the bounds <code class=\"language-text\">t0</code>, <code class=\"language-text\">tH</code>, <code class=\"language-text\">tA</code>:</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto;  max-width: 899px;\"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 16%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"bitcoin asic 8\"\n        title=\"bitcoin asic 8\"\n        src=\"/static/daab0d119ce4e844c2d6a6e9970993b9/b2161/bitcoin-asic-8.jpg\"\n        srcset=\"/static/daab0d119ce4e844c2d6a6e9970993b9/20e5d/bitcoin-asic-8.jpg 450w,\n/static/daab0d119ce4e844c2d6a6e9970993b9/b2161/bitcoin-asic-8.jpg 899w\"\n        sizes=\"(max-width: 899px) 100vw, 899px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>The interest rate <code class=\"language-text\">r</code> is external to the protocol so that can be treated as a constant. <code class=\"language-text\">tA</code>, and <code class=\"language-text\">t0</code> are free-variables of sorts. <code class=\"language-text\">tH</code> is determined by external things like R&#x26;D pace and is outside the realm of the protocol.</p>\n<p>So, that just leaves <code class=\"language-text\">S</code>, <code class=\"language-text\">S*</code> and <code class=\"language-text\">P</code>. It doesn’t really matter what <code class=\"language-text\">P</code> does — it’s capped by <code class=\"language-text\">S</code>, and cost is highest when it’s small anyway. <code class=\"language-text\">S</code> and <code class=\"language-text\">S*</code> are just different forms of the security budget — one is a projection, the other is actual. So it all comes down to the security budget.</p>\n<p><strong>Security budget dominates attack cost — ASICs or not!</strong></p>\n<hr>\n<p><strong>Part I: <a href=\"https://jordanmmck.com/long/bitcoin-security\">Bitcoin Security: a Negative Exponential</a></strong>.</p>\n<p><strong>Part II: <a href=\"https://jordanmmck.com/long/bitcoin-chart\">Bitcoin Security in One Chart</a></strong>.</p>\n<p>Thanks to <a href=\"https://twitter.com/dinocelotti\">Dino Arturo Celotti</a>, <a href=\"https://twitter.com/chrisamccoy\">Chris McCoy</a>, <a href=\"https://twitter.com/teo_leibowitz\">Matteo Leibowitz</a>, and Jason Varner.</p>\n<h2 id=\"appendix\" style=\"position:relative;\"><a href=\"#appendix\" aria-label=\"appendix permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" height=\"20\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"20\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Appendix</h2>\n<h3 id=\"more-precise-description-of-upgrade-cost\" style=\"position:relative;\"><a href=\"#more-precise-description-of-upgrade-cost\" aria-label=\"more precise description of upgrade cost permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" height=\"20\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"20\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>More Precise Description of Upgrade Cost</h3>\n<p>The network upgrades in discrete chunks. A miner does a calculation and determines they can capture some slice of the overall income stream, <code class=\"language-text\">S(t)</code> for less than <code class=\"language-text\">PV</code> of that stream slice.</p>\n<p>Miner 1 finds <code class=\"language-text\">PV</code> for their expected slice of the current projection of <code class=\"language-text\">S(t)</code>, and spends less than that amount on hardware. Miner 2 finds <code class=\"language-text\">PV</code> for their expected slice of a new projection of <code class=\"language-text\">S(t)</code> and spends less than that on hardware. And so on. <code class=\"language-text\">S(t)</code> is a projection — it is updated for each iteration.</p>\n<p>So the total amount spent on hardware for the network for some period should be capped by the sum of all the <code class=\"language-text\">PV</code>’s of these slices of changing <code class=\"language-text\">S(t)</code> streams calculated by upgrading miners, for this period.</p>\n<p>This could be expressed as a sum of integrals, but we don’t know how many discrete upgrades happen — it seems it should be a double integral of some sort. I tried this but didn’t get it worked out.</p>\n<h3 id=\"discounting-income-streams\" style=\"position:relative;\"><a href=\"#discounting-income-streams\" aria-label=\"discounting income streams permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" height=\"20\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"20\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Discounting Income Streams</h3>\n<p>Assuming hardware advances, the total hash power produced by a network will tend to increase even if security budget (total miner revenue) is constant. So the percentage of total hash power produced by any given piece of hardware will decline over time.</p>\n<p>Therefore <code class=\"language-text\">s(t)</code>, the income stream captured by any piece of hardware, is downward sloping.</p>\n<p>At some point the hardware costs more to run than it’s worth, so the revenue stream, <code class=\"language-text\">s(t)-p(t)</code> goes to zero. This happens after a period of time <code class=\"language-text\">tH</code>.</p>\n<p>The overall income stream also tends to decline (declining block rewards). This must be factored into miners long term decisions.</p>\n<p>The income stream, <code class=\"language-text\">s(t)</code> must also be heavily discounted due to risk — it depends on price, block rewards and fees, two of which are unpredictable.</p>\n<p>All these factors and uncertainties result in miners heavily discounting the expected value of their income stream.</p>\n<h3 id=\"hardware-over-allocation-smooth-out\" style=\"position:relative;\"><a href=\"#hardware-over-allocation-smooth-out\" aria-label=\"hardware over allocation smooth out permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" height=\"20\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"20\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Hardware Over-Allocation Smooth Out</h3>\n<p>Hardware spend is based on the present value (<code class=\"language-text\">PV</code>) of a projection of some income stream. If things are booming the projected income stream might justify the miners buying lots of hardware.</p>\n<p>Then a downturn happens, projected income is low, and miners have “too much” hardware. However they keep mining as long as they aren’t losing money.</p>\n<p>Miners of course try to avoid this by being conservative with their hardware purchases, and generally preferring to upgrade as rarely as they can. Over-allocations should also smooth out over time. Miners who consistently over-allocate on hardware will get bled out.</p>\n<hr>","fileAbsolutePath":"/opt/build/repo/content/docs/writing/bitcoin-asic.md"}},"pageContext":{"slug":"bitcoin-asic"}},"staticQueryHashes":["26522286"]}