One of the more interesting developments around moxie is the adoption
of the moxie
architecture by
the core bitcoin developers (Jeff
Garzik, in particular), for an
experimental project called
moxiebox
.
To quote Jeff...
The goal is to provide a secure, sandboxed execution mechanism that enables deterministic input, processing and output. Execution is separated out into distinct phases:
- Prepare and load hash-sealed program executables, data.
- Execute program as a black box, with no I/O capability. Runs until exit or CPU budget exhausted (or CPU exception).
- Gather processed data, if any.
A single thread of execution pre-loads necessary data, then simulates a 32-bit little endian Moxie CPU, running the loaded code.
I don't pretend to have deep understand bitcoin technology, but my basic understanding is that moxiebox could be used to implement automated smart contracts. For instance, signed moxiebox executables controlling a certain number of bitcoins could be distributed in the block chain. These programs would decide what to do with the bitcoins based on program execution against certain input. People could independently verify the results of this program because it's all designed to be completely deterministic and reproducible.
From a moxie tooling perspective, I added a moxiebox target to the GNU toolchain to simplify its use. The moxiebox project supplies the simulator, as well as crt0 and some custom moxie runtime libraries. The 'moxiebox-gcc' compiler is configured to link everything in the right order, including newlib, the custom crt0 and sandbox runtime library.
It's not clear how things will develop, but one thing that's come up is extending the moxie ISA to include new instructions in support of crypto activities. We'll just have to see. You can follow along at http://github.com/jgarzik/moxiebox.