Bitcoin Forum
May 30, 2024, 05:26:14 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 ... 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 [74] 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 ... 463 »
1461  Other / Beginners & Help / Re: RBF vs CPFP on: May 03, 2021, 03:56:20 PM
Electrum has supported RBF some years ago, but if RBF is enabled, you will need to still flag the transaction to support RBF, unlike now which is dafault while sending unless you flagged the transaction not to support RBF.
It has been enabled by default for years and transactions are sent with the RBF flag. I don't think there were any changes to this behavior recently, 4.x.x but it was changed in 3.3.0, from the changelog.

I tried my best to reduce the post contents, but will result to missing of important information for newbies. Just trying to simplify it as it could be.
Newbies don't have to know the technical stuff behind RBF or CPFP, or anything to that extent. They just need to know how to remedy something like this, which the links in the first reply has covered together with pictorial illustrations.
1462  Bitcoin / Electrum / Re: Network Choice And Different fees on: May 03, 2021, 02:13:08 PM
Electrum only support Bitcoin, forks of that may support certain altcoins but they're neither supported not endorsed by the developers.

1463  Bitcoin / Development & Technical Discussion / Re: 51 Node attack on: May 03, 2021, 01:07:12 PM
I may have been unclear in my previous posts. A setup would be as follows:
*Someone is running a node on a public WiFi network -- this is potentially vulnerable to a Sybil
*Your computer on the public WiFi network connects to your home computer via an encrypted connection -- your home computer is running a full node and is vulnerable to a Sybil if an attacker is attempting to attack you specifically, although this type of Sybil is more difficult to pull off.
*Your home computer has an encrypted connection to a VPS (or other computer on a different network) via an encrypted connection that will relay block/transaction information to your laptop via software other than bitcoin software. An attacker trying to specifically attack you will have no way to know they need to Sybil the node running on the VPS.
Are you guarding against MITM attacks specifically? IMO Sybil or Eclipse attacks are not cheap nor that great of a concern. It should be better to make Bitcoin Core use Tor instead of complicating things by chaining multiple nodes and probably incur much more costs as well. If it is a targeted attack, then you're just reducing the probability of the attacker influencing the nodes which Bitcoin Core should connect to. The attacker has to figure out your onion address and the nodes for which you're connected to for a successful eclipse attack which could be quite difficult.

There are safeguards against eclipse attack implemented in Bitcoin Core. Having a secure connection between your node and the other nodes would defeat MITM and the safeguards would do the rest.
1464  Bitcoin / Bitcoin Technical Support / Re: Bitcoin-qt/Core 0.21.0 online transaction, wont get created in the pool, HELP!! on: May 03, 2021, 12:26:10 PM
Go to your transaction history, right click on this transaction and press "Copy Raw Transaction".

Go to Window>Console and type in the following format:
Code:
 sendrawtransaction 02000000000101593667ff1dab2db89187f86516f02c8be82cef4bd0263e2a86b585936e5c46072f00000000fdffffff02a08601000000000017a914cd1b794d70d6e22a9021fbfdc15a87e22836c99987a4b037000000000016001489e3eb9b249bc3f4bfdde6ad8f2623276fba2fb5024730440220096f5c202b2773470ad1a59b809a1c24d88e2892ad20bc7325b9dfc8ea216eb402202cb2c8cf7bf3423857c79124bebc5c524864cd395fd674c3cbdcccff3dd2a2de012102c4d46568c7cdf547a92c870f8b245265a90e2c1ed44e027cbb2e3572ad9a6d7d372a0a00

Replace the long string (02000...) with the one that you've copied.
1465  Other / Beginners & Help / Re: RBF vs CPFP on: May 03, 2021, 12:17:12 PM
-snip-
 Each time you want to make a transaction, there will be an option to flag a transaction to make it support RBF, but the latest electrum starting from version 4.1.1 and up, the transaction will be automatically support RBF unless you flag it not to support RBF.
-snip-
It has been turned on by default for quite some time, since one of the version from 2018.


This is the way to cancel a transaction too, the fee will be pump but the address will be changed to another address on the wallet so that the unconfirmed bitcoin transaction will be diverted from the former receiver's address to another address which is from the sender's wallet address, which means the transaction is cancelled but require higher fee.
Almost there. Even if you were to use RBF and spend the inputs to another address, miners can still choose to include your first transaction instead of the one with the increased fee. They are both valid until one of them gets confirmed.

In all cases of RBF, there will be change of transaction hash (txid) as the unconfirmed Bitcoin is double-spent.
It is changed due to either some change in the inputs/output or some change in the value of the outputs.


No offence, the post is actually extremely wordy and some better structuring would be needed.
1466  Bitcoin / Electrum / Re: Newbie to Bitcoin stuck with broadcast transaction on: May 03, 2021, 03:10:32 AM
Just create another transaction with a larger fee rate. The current minimum mempool fee is at least 2sat/vbyte.

The transaction wasn't broadcasted because it didn't meet the minimum mempool fee rates. This means that nothing actually changed on the network level so you should be able to create a new transaction on your online Electrum.
1467  Economy / Service Discussion / Re: What are Bitcoin mixers, and why do exchanges ban them? on: May 02, 2021, 10:51:59 PM
What do you mean by exchange ban them? Does the exchange site be able to detect if the Bitcoin came from mixers? I think it depends on the exchange whether they have on their terms and condition whether they ban those coins or not.
Some mixers or services exhibits certain identifiable behavior and it would be fairly easy to flag them as a suspicious transaction, CoinJoin namely would have many inputs and outputs with some of the outputs having consistent value. It is not difficult for them to identify it but tracing it would be a problem.

Transferring the coins a few times after mixing could probably solve the issue. This way, there is an argument to be made that you're not the one using a mixer and instead the person who sent you the coins did. It's not a guaranteed success but it would be better than sending the CoinJoin to them directly. Keep in mind if that if an exchange doesn't want you to use CoinJoin or any mixers, then your privacy is under threat anyways. I consider them complicit with helping the government to track their customers.
1468  Bitcoin / Development & Technical Discussion / Re: Shouldn't DNS seeds avoid returning pruned nodes? on: May 02, 2021, 10:39:17 PM
[Start Rant]
Pruned Nodes have got to have been one of the lamest designs of all time.

By not requiring all nodes to maintain a full blockchain, this opens the potential that one day the full blockchain may be lost.
Pruned nodes are meant for those users who wants to run Bitcoin Core but cannot keep up with the storage requirements. It is not a substitute for archival nodes because they're different in certain aspects.

IMO, even if you don't allow people to use pruning, then they would simply not run a node at all. Eitherways, those running pruned nodes are still a net benefit to Bitcoin. As long as people are aware of the utility and differences between the both of them, there is really no problem about this. Some will continue running full archival nodes and the rest that can't will simply run a pruned full node.

...
But I think this is a better as an entirely separate topic instead of continuing it on this thread.
1469  Bitcoin / Bitcoin Technical Support / Re: Recovering a 12 word phrase on: May 02, 2021, 10:13:45 PM
When trying to recover, I get "Checksum Failed".
The guy is sure these are the words, he has them printed. I have the wallet receiving address. I understand there's a BTC recovery tool but can't figure how to use it
The only instance which the checksum will fail given a correct BIP39 seed is if it was generated with Electrum.

If not, here's a guide on BTCrecover and trying to unscramble the seed phrase: https://github.com/3rdIteration/btcrecover/blob/master/docs/BIP39_descrambling_seedlists.md.
1470  Bitcoin / Bitcoin Discussion / Re: PoW and free energy on: May 02, 2021, 04:07:14 PM
Indeed, that's why I said "almost free". And yeah, the acquisition of ASICs can be difficult too but not impossible for a government (they can reclaim whatever and even coordinate with other states).
Coordinating multiple governments is a hard enough tasks, coupled with potential conflict of interests between them.

China actually controls about 65% of the hashrate, based on CBECI's research BUT that is based on a sampling of several mining pools which are pretty much all based in China so take it with a pinch of salt. If you're talking about controlling the current 51% of the hashrate, it is already possible for certain states to have that much within their geographical boundaries but coercing and coordinating an attack, especially with such a huge and diversed region like China could be very difficult.

If you're thinking of the government purchasing them, it is possible but it would be a terrible idea. It would be useless after an attack.

But neverthless, the biggest obstacle to a successful long-lasting 51% attack is the energy consumption. And in a hypothetical future where nation-states has the monopoly of nuclear fusion energy production, they can use that advantage to do such attacks.
Bitcoin's energy consumption is not excessively big, not that current infrastructure cannot support it and I predict by the time nuclear fusion becomes practical, the cost and efficiency of other forms of energy would've probably increased as well. 51% attacks cannot be sustained over long periods of time; after a single attack, the community would react to the attack accordingly and probably render the ASICs useless. There is no point in sustaining such an attack and given Bitcoin's total market cap, any 51% attack would be purely political as the cost would probably be greater than the benefits and that the GDP of a single country is likely greater than what they stand to gain financially from such an attack.

But, if you're talking about countries like North Korea then they probably would be incentivised financially. Given their energy situation, its safe to say that they're far from a threat.
1471  Bitcoin / Development & Technical Discussion / Re: Shouldn't DNS seeds avoid returning pruned nodes? on: May 02, 2021, 01:19:09 PM
Thanks for the info, it is useful. But unfortunately this seems to return nodes that have these flags not nodes that have only these flags which means it still returns a node with NODE_NETWORK_LIMITED flag if it has the specified flag too.
Yeah I get what you mean. But the NODE_NETWORK_LIMITED doesn't mean that the node is pruned. My node, which has the entire blockchain on disk also signals NODE_NETWORK_LIMITED with 1033 flag, 1024 for being able to serve last 288 blocks, 8 for NODE_WITNESS and 1 for NODE_NETWORK.

So, for a full node with the entire blockchain, it should not only signal NODE_NETWORK_LIMITED but also NODE_NETWORK.
1472  Bitcoin / Development & Technical Discussion / Re: Shouldn't DNS seeds avoid returning pruned nodes? on: May 02, 2021, 12:29:53 PM
Could you please elaborate?
A nifty way to do so is to (prepend) the desired strings[1] as a subdomain to query. For example, nslookup x9.dnsseed.bluematt.me.

This will work if the DNS seeder supports service bits filtering[2].


[1] https://github.com/sipa/bitcoin-seeder/blob/a09d2870d1b7f4dd3c1753bbf4fd0bc3690b7ef9/main.cpp#L165
[2] https://github.com/bitcoin/bitcoin/blob/7cb0bcb6811070786937fb5cc0af82cf4ef21ff0/src/chainparams.cpp#L121
1473  Bitcoin / Bitcoin Discussion / Re: PoW and free energy on: May 02, 2021, 10:45:44 AM
It is not free. Costs are incurred in the areas of R&D, maintenance, labour, etc. These are all costs that has to be offset by the producer and it should be more expensive than current methods. It's more of a cleaner energy than a free energy.

Proof of work will still function fine, you're possibly only (as stated probably not) reducing the costs from consuming the electricity. There are still scarce resources being consumed and incurred, production of ASICs, land, labour. It doesn't diminish any security of PoW based coins, perhaps slightly in the worst case.

State sponsored attacks, assuming 51% attacks has never been limited by the electrical costs or anything in that area. It is possible for countries to attack Bitcoin this way but it really doesn't make any sense right now and I don't expect countries to attempt it in the future either. ASICs required and the opportunity costs of having an attack is far greater than any benefits that they may have.
1474  Bitcoin / Development & Technical Discussion / Re: 51 Node attack on: May 02, 2021, 07:20:12 AM
If the attacker knows of your connections, you do not have a secret node. The attacker knows of all the nodes you are using.
It is quite hard to prevent any leakage of the connections that you have. Getaddr does have privacy measures but if a person is determined enough, they can still achieve it though with much more difficulty. As I've mentioned in my previous post, without a MITM, it would be fairly hard for an adversary to execute a sybil attack that affects the security to that extent. Something like this would require a (relatively large) amount of resources with different IP ranges, and a huge number of nodes it to be even possible, not regarding the feasibility.

Having a secret or a trusted node can be a solution but it is definitely not necessary or doable for most, unless the final node that you're connecting to is definitely not getting sybil'ed, then you're safe. If it isn't then you're just wasting your resources. The counter against such attacks is the cost and the features of Bitcoin Core.

If you are using public wifi, you could connect to your home computer (that is also a node), which connects (not via a node) to another node on a VPS that only you are aware of. The attacker might be able to Sybil your home computer node, but would not be able to Sybil your VPS node, and you can be alerted of the attack and act accordingly.
Connections between nodes are not encrypted. Packets can be dropped by the adversary and there is simply no way to detect something like this happening if the attacker can intercept the packets.
1475  Bitcoin / Development & Technical Discussion / Re: 51 Node attack on: May 02, 2021, 06:54:11 AM
The best way to prevent a Sybil attack is to have at least one node whose identity is not public. In order to execute a Sybil attack, the attacker needs to know about all of your nodes and cut them off from the rest of the network accordingly. If you have one node that is secret, the attacker has no way to know to cut off that node, and you can be aware of the attack attempt.
Not exactly. It does nothing if the attacker is actively listening to your connections, ie. a public wifi of some sorts. I'm not sure if this is the case but it wouldn't work if Bitcoin Core will tell the peers about the nodes you know about upon receiving a getaddr message. Trying to connect through another type of network or using some form of secure communication would reduce the chances of a successful MITM.

Implementing anchors.dat does help with the situation somewhat by mitigating the possibility of eclipse attack.
1476  Bitcoin / Development & Technical Discussion / Re: 51 Node attack on: May 02, 2021, 03:23:27 AM
The only type of attack that one can perform by controlling a large number of nodes (not necessarily 51% of them but juts a large number) is Sybil attack. In this attack the attacker fills the network with their own nodes and could connect to your node and fill all its connection slots to effectively cut it off from the rest of the network. Then they can prevent your node from broadcasting transactions, seeing new blocks, etc.

The worst thing that can happen is if Sybil attack is combined with some mining power. The attacker, after isolating the victim's node, could perform a double spend while cutting that node off from seeing the double spent transaction and mine a block to contain an invalid tx (already spent) that pays that node's operator.
These attack should probably work better with MITM attacks and the attacker can possibly restrict the peers that they can connect to. It is usually quite targeted and specific as well, instead of it being a general attack as that'll be quite impractical given both the financial limitation as well as Bitcoin Core's node connection policy (IIRC it restricts the number of connections to each subnets). A single connection to a non-attacker controlled node will render this attack ineffective as well.

Both of them are possible but the scope of the attack is quite limited as well and doesn't make much sense financially.
1477  Bitcoin / Development & Technical Discussion / Re: 51 Node attack on: May 01, 2021, 04:31:26 PM
No they cannot.

The nodes can do whatever they want, accepting invalid transactions, accepting blocks with thousands of block regards, etc. However, as you've mentioned, nodes enforces the rules themselves. No matter how many nodes an attacker controls, the set of rules that each node enforces cannot be changed. They will not accept any invalid blocks, transactions, messages, etc and they will be kicked after hitting the ban limit for the nodes.

The miners also cannot dictate the rules directly nor can they violate any rules if they want it to be accepted by the nodes.
1478  Bitcoin / Bitcoin Discussion / Re: travelling internationally with a hard wallet on: May 01, 2021, 12:51:34 PM
Have a general sensing on the local laws first. If the jurisdiction that you're visiting explicitly bans cryptocurrency and/or deems any activities related to it as being illegal, I would advice you to err on the side of caution and leave it at home. Especially if you're a person of interest, something like this is probably an excuse that they can use. Might just be unnecessary paranoia but I personally wouldn't leave it to chances.

Hardware wallets are not completely safe from physical attacks as well, exposing it unnecessary like this would bring about a huge risk.
1479  Economy / Services / Re: IF ANYONE CAN GET MY TX AT LEAST ONE CONFIRMATION, I WILL PAY YOU $100 on: May 01, 2021, 07:55:36 AM
Fees dropped as low as 10 sat/byte in the past hours, and I expect it to go a bit lower tomorrow (as most Sundays).
Probably. $100 is still quite little even with 10sat/byte.

ViaBTC's paid transaction accelerator doesn't even recognize the transaction, and other mempools have likely dropped it too. If you made this transaction from your own wallet, you may be able to remove it and just create a new transaction with a higher fee.
ViaBTC requires at least 10sat/byte.

Depends actually. Some wallet do not remove or give their user an option to remove the transaction even when it gets dropped from most node's mempool. Could be a problem if this is the case.
1480  Economy / Services / Re: IF ANYONE CAN GET MY TX AT LEAST ONE CONFIRMATION, I WILL PAY YOU $100 on: May 01, 2021, 07:00:24 AM
At 20sat/vbyte, you'll be looking to pay at least $300-$400 in fees. If anyone is willing to confirm it for less than that, they're likely trying to scam you.

What wallet did you use for this? You can probably attempt to make another transaction which spends a higher fee if it gets dropped.
Pages: « 1 ... 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 [74] 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 ... 463 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!