I was very clear what I meant by "invalid" in my email: WT^ transactions that represent miners stealing funds. **Please stick to that** and do not play word games.
Dear Paul,
In point of fact, he is wrong, because nodes do the counting. When miners find a block, they can choose to move the counter up, down, or not at all. But nodes do the counting.
I may very well have confused who counts what
In the second case, it so happens that [DC#1], [DC#2], and [DC#3] would also accept any WT^ *that followed the Drivechain rules*, even if they did not like the outcome (because the outcome in question was arbitrarily designated as a "theft" of funds -- again, see the second case in the list above). In this way, it is exactly similar to P2SH because nodes will accept *any* p2sh txn **that follows the p2sh rules**, even if they don't "like" the specific script contained within (for example, because it is a theft of "their" BitFinex funds, or a donation to a political candidate they dislike, etc).
This is false.
For miners to steal P2SH funds, the P2SH script would have to be coded to explicitly allow them to do it.
How many P2SH scripts are you aware of that are used for the purpose of facilitating such theft?
I know of none, and I bet there are none.
The [DC#2] and [DC#3] nodes would do exactly what the [DC#0] and [DC#1] nodes do. This is what I mean by "every withdrawal is valid".
So, here you are again re-affirming that WT^ transactions representing stolen funds are allowed in DC, and by tying them all together you are also affirming that the SPV proofs mentioned in DC are completely irrelevant / pointless / unused.
Again, in P2SH miners cannot steal funds, because all full nodes have a fully automatic enforcement policy.
In DC, miners cannot steal funds, because all full nodes have a fully automatic enforcement policy.
However, DC *allows* users to choose to place some of their BTC at the relative mercy of the miners in creative ways, if they wish (as does P2SH -- someone could write a script which donates funds to miners, and then fund it... "paying" to that script). This is another example of conflating [DC#1] and [DC#3].
So in the first sentence you say they "cannot steal funds", but everything else you've said, including the following paragraph, and your specification, indicates they can.
I've finally collected all my thoughts / concerns and have also summarized them in this document: