Security soft fork deployments arent risky

After reading this passage, it seems like there are 2 phases to softfork development

  • Design
  • Deployment

I would put analyzing confiscation risk under the design phase. I agree there can be subtleties to (potentially) confiscatory soft forks. However I believe that risk is isolated in the design phase rather than the deployment phase.

If consensus is reached during the design phase – for instance if there are certain Scripts could many nodes on the network – that risk is already baked into the cake in the deployment phase. We are disallowing something that is harmful to network operation. We should use this fact to our advantage when deploying a security soft fork.