You cannot stop Bitcoin metapocols

Bitcoin is a database.
This is a fact that has inevitable technology. Money Itself is just a ledger, record who has. Even the money’s worthwhile is simply distributing that “database” in real world. You no longer need to check against some middle ledger to confirm anything because the simple action to give you is the verification process. “Included” In the Ledger completed the completion of the contents of the medium. Bitcoin is just a digital database trying to repeat the most important material that is known as money: Not seeking permission to spend the money for your spending data.
Think about the fondness of trying to prevent people from using dollar bills. How many of you did the stamp “Buy Bitcoin” on Fiat Curren? Procrastination BankNote in the United States is a criminal offense. You can spend 6 months in prison so. Is that stopping anyone?
Do you think firmly that can be enforced anywhere? Do you remember what George is George? People will include a dollar bills to enter serial numbers when they find them and track where money notes were distributed.
Artists make Innate Murals and Collages in Cashnotes. Literally you can’t give up.
Why is there difficulty of magic believing that this is possible because the database is a digital?
In its sense of Bitcoin requires support for controversial information (read: difficult data information or defines prematurely) to allow users to sell. You do not know whenever you will send (the intent field in the outcomes), where you will send it (the script field), whether the blockkhoice you may wish to use in (NLOCKTITLE Field in the transactions).
Without allowing these pieces of arguments, it is not possible for Bitcoin there as a denomination.
Metaprotocols
MITCOIN METAPrOTOCOL is a Protocol programmed on the basis of the foundation, Bitcoin, translating basic protocols using the LENS of additional rules that is not in that agreement.
The historical example of this would be Proteckarty (XCP) protocol. Using OP_Return, Oppeturn, OPPETURN ON THE NEW BITCOIN SATEMENTS IMPORTED STACK MAKE ATTENTION OUTSIDE NEXT ITTO SET, XCP has embedded its metaprotocol messages.
These messages enhance the release of new tokens, referrals for the tokens by explaining how much and anywhere, and other messaging messages issued tokens.
Bitcoin Protocol itself does not understand, or take care, any of these messages. Are translated into additional software over Bitcoin. Completely anyone using Bitcoin XCP unauthorized messages completely and confirmed on-chain, but XCP software will not recognize as valid. Person Art This unauthorized message is just spending their money creating useless transactions.
Nothing can prevent people from translating the right Bitcoin information through the LENS of additional external external laws to the Bitcoin Protocol this way.
Principles work in the same way. Users assign to ‘different serial number’ throughout one masking, and created its accounting program to translate the installation and release of the planning of transaction transactions that will follow.
The Bitcoin Protocol is it completely unaware of this external protocol, and nothing can be done to stop users to translate the valid Bitcoin. Anyone can translate information published in Blockchain but they want, to use any additional issues they do not conflict with the Bitcoin Protocol.
Nothing blocks people from unauthorized or malicious metapocol messages, and confirms those in Blockchain, but users use metaprotocol clients simply neglected as wrong. This is a key difference between the Protocol of Bitcoin, and metaprotocols. The rules of Bitcoin Consensus prevents invalid protocols from the beginning of the BlockChain, Metaprotocols do not make (or instead cannot).
Embeddown data
The difference between these two metapotocol items that the above is the person who need to urge additional data to work (XCP), while the other is (Principles). Therefore, you may think you can avoid the protocols need to embed more data by simply preventing that data in the first place.
While it is true that certain data prevention methods can be prevented softforking that device from protocol, which means a transaction that uses that does not work, you cannot block data from the General.
Take “a writing envelope.” This is simply a specific way to ensure that the witnessing data is not killed. This is done using the OP_False, dragging 0 (or a false number to fail) in the stack before OP_Pushes embedded details. This creates the script translator just exceeding verifying the information behind the OP_False. The main functionality is required to put 0 in the stack.
If you agree to the use of this specific text format, there are other ways to put 0 in Stack, or to ensure the script documents, or ensure the verification of the following chunks. Just trying to stop this specific data embarker, and I mean the use of Op_False usably, itself becomes a cat and mouse game and other multiple users to turn.
Disable each of them requires SoftFFORK sentition, a massive The hard work link throughout the ecosystem, and right after successful users can change their software to use alternatives. Metaprotocols may be more efficient than Bitcoin. I miss you, this only only Dealing with this one section of the data embedding.
Let us make the actual hypothetical’s original way when all OP_False methods are prohibited (ignoring both cases of allegations that have not intended Bitcoin Cases), users simply forming non-public keys. Nothing in the Bitcoin Protocol confirming the Public key is a valid public key, it is simply a random entry installed on the property lock script.
Now think about the world when Bitcoin every Include the public key verification before allowing money to be sent. That can solve the problem?
It is wrong.
You can embark on data indirectly Using a private key. But independent keys don’t really make on-chain right? No, they don’t do it, but Signature Note. NCE is a random benefit used in the construction of the cryptographic signature. This is required to protect your private key, because without using one Cryptographic signature insecurity, and can reward your private key on the attacker. Even using the most options, or weak, notes can allow that to happen.
People can deliberately use a weak Nce n’t, and actually Use controversial argument data as a secret key. The only way to prevent this can be restricted is white white white power holidays, which is to complete the strength of the Bitcoin after the digested officer.
These examples are not perfect, there are many other ways to think to embed a blockchain data, and I am sure I can.
Trying to play the WHOactermole and all simply spend time and all-natural resources trying to link softForks each, a gracious a complex and expensive effort, and at the end of the day There are ways possible in ways that are not possible to protect at all without completely breaking the Core Bitcoin Personal Protocol.
Why will the user continue to do this
I’m sure that many people learn this think that “we just have to do this for a few times and people will stop trying, will go to all extra effort.” That attitude is completely discontinued from the facts for many reasons.
I want you to think about these two reasons why people will be involved in this form of origin. Either it provides the actual benefit to us, that is, service to their life in their lives that provide a very unpleasant price in causing it, or is pure guess.
Let us look at the first case. There is a certain amount of use of the purpose provided, which cannot be provided in another manner, or at least not at the same level, or similar safety credentials, etc.
This hypothetical protocol is a real item in these people, something that gives something needed or important to them. They all have encouragement to synchronize protocol to work on what new new restrictions added.
Let us now look at the second case, a crime for consideration, which means the NFTS or any form of a joint collection or token. These types of things are addressed by a pure manna, a large sum of money is thrown into the music chairs and everybody who plays out of the door for profit because the mania is finished.
These things continue around, and they never kept persistent, and even walking. What makes you think that limits one type of building those goods will cost you young people? I will remind you at this time that “Identification” for these things with the Bitcoin is in the principles. That metapocol specific is impossible to block or prevent any way at all.
Nothing about preventing certain ways to embed data preventing the transmission or sale of goods previously used using that method, so nothing can be prevented from preventing those existing goods.
People who share in these tasks are suffering, chasing blindly any opportunity they can get through a quick belt. Do you think them to stop them from making new goods of some kind will block them? Forcing them to use new methods possible Fantastic calling In those new types of goods. It will not be demoliations, it will be practical encouragement.
The new machine will be desired to them because of the opposite amount. This is just a losing game, just as I saw in the upper section ends with the use of true ways.
The course of action of action
It is impossible to suspend the impact of data for the ordinary argoin. It is possible to quit Some specific forms of the fences of embarking, but not a common practice. So why do we fight these things?
Everything we can do at the end of the day continue to press these incidents into poor ways generously causing a significant impact on the network. Leaving the right-based methods, which Grand Scheme of things are more efficient in accordance with the use of network resources, is a reasonable move to do.
Trying to transfer data to bitcoin is impossible, but trying to eventually hurt. Leads us to the way to finally and limits The use of Bitcoin as cashand it’s at the end of the end failed.
It just cut your nose to make your face for you.