Hi All,
Just a small remark
> lnhance is more comprehensive. but also it's so much harder to reason about three separate op codes and what the attack surface could be.
It's 4 opcodes, but ofc it's safe to ignore INTERNALKEY when it comes to unexpected interactions.
We have spent basically a whole year on walking in circles with various opcode combos.
We came up with a set of threshold rules that make sense as an evaluation framework:
- Fine-grained introspection
- State-carrying covenants
- Bigint operations
- New arithmetic capabilities using lookup tables
These are key "ingredients" to exogenous asset protocols that are script interactible and novel bridge
constructions, that might interact badly with mining decentralization.
Many other proposals instantly violate some or all of them, not LNhance.
To this day I haven't seen anyone come up with anything remotely scary with CTV+CSFS+PC.
I would like to encourage people to take the time and try to come up with anything "nasty".
BR,
moonsettler
Sent with Proton Mail secure email.