Bitcoin Forum
May 25, 2024, 03:48:19 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 2 3 4 5 6 7 8 9 [10] 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 ... 195 »
181  Bitcoin / Development & Technical Discussion / Re: A rolling root to solve Bitcoin's scalability problem? on: March 06, 2014, 02:14:31 AM
Quote
1:31:31 PM sipa: sugarpuff: now, about dealing with ways to improve performance, IF you are giving up zero trust

I just want to point this out, to make sure that no one overlooked it.

Lots of problems get really, really easy once you give up security.  Trusted systems have wildly different properties than trustless systems.  If you don't mind moving from a trustless to a trusted system, then what you are proposing can work*.

P.S.  Nothing in this thread is new.  Even the posts telling you it won't work are recycled.

* For some values of work.  If bitcoin had been designed as a trusted system (even a distributed-trust system like you are proposing), I'm not sure that they would have worked in the sense of being worth trading 6 cents for, much less $600+.
182  Bitcoin / Development & Technical Discussion / Re: Million dollar idea or noob question on: March 05, 2014, 05:28:09 AM
Ugh.  What exactly do you think bitcoin is doing?

Your coins are "locked" to your account until you unlock them by spending.
183  Bitcoin / Development & Technical Discussion / Re: Bitcoin disk space scalability problem, is it really a problem? on: March 05, 2014, 05:24:42 AM
If I "sent" you coins and you didn't have the block which contained the transaction which contained that output how would you validate the input is valid and not just some nonsense I sent you because I know you have no way of validating?

That just wouldn't be possible. It would be discarded like all other invalid transactions.

You wouldn't be able to send to or from an outdated address (it would be considered invalid). You'd use the new ones that were copied as new transactions to the head. It's possible I am misunderstanding (I've only read the original paper a couple times, and perused the wiki, but I'm not working with the code itself).

Sidenote: consensus about an ancient block should be extremely high. There should be no disagreement about it.

Discarded by whom?  "Considered invalid" by whom?  Which ancient block?

Bitcoin is an imperfect solution to a very hard problem.  You can't just handwave it all away like Dilbert's boss.

http://dilbert.com/strips/comic/1994-10-17/
184  Bitcoin / Development & Technical Discussion / Re: Delayed transactions (using nTimeLock) on: March 03, 2014, 01:09:18 PM
What's the current status on major mining pools accepting Lock_time transactions / higher sequence number replacements?

They don't.

No one will accept your transaction until it is final (nLocktime in the past and/or nSequence at maximum).
185  Bitcoin / Development & Technical Discussion / Re: How to send non-standard transaction? on: March 02, 2014, 04:10:24 PM
3. Is it possible to disable checks in Bitcoin-Qt for non-standard transactions? I want my own client to accept and relay non-standard txs (like in -testnet mode)

Look for IsStandard functions.  Modify them to return without checking.

5. Is there a tool to check which transactions are in peer's memory-pool? E.g. - I send my raw transaction to my peer and after this i check his memory pool for it. If my transaction is there - it means everything goes normal

No there is not.

Your best bet is to organized a group of people interested in running a non-standard relay subnetwork.
186  Bitcoin / Development & Technical Discussion / Re: Gox stash recoverable by wallet update? on: March 02, 2014, 03:53:12 PM
No, "fixing" this problem would kill bitcoin.

If someone can create new coins out of thin air, then bitcoin's supply is no longer limited.  If someone can move coins without proving the private key, then your coins are no longer yours.

Bitcoin's value comes from the usefulness of these properties.  Without them, there is no point.

The good news is that no one can force anyone else to accept changes they dislike.
187  Bitcoin / Development & Technical Discussion / Re: How to send non-standard transaction? on: March 02, 2014, 03:46:08 PM
Most nodes enforce rules that aren't in the protocol.  The example getting the most press right now is padded signatures.  The R and S values in a signature should not be padded with null bytes when they are short.  If they are padded, they are considered nonstandard, and most nodes will not relay them.  But, they are perfectly valid in the protocol, and if they make it into a block, no node will reject that block.

The much more common one involves script patterns.  The protocol allows huge discretion on what you can set as your output script, but the network will only accept a few templates as standard.  If I recall correctly, there was an incident a while back where gox was sending malformed payments that could not be redeemed.  Unfortunately, they made their way to a miner that did not enforce standardness, so they were committed to the blockchain and lost forever.
188  Bitcoin / Development & Technical Discussion / Re: "In Bitcoin, public key are either compressed or uncompressed" on: March 01, 2014, 08:48:08 PM
When you send, you are sending to a hash.  You have no idea what it is the hash of.  It could be a compressed pubkey, it could be an uncompressed pubkey.  You don't know and don't care.

The transactions that you are redeeming will be either compressed or uncompressed depending on the keys and addresses you received them with, which depends on where your addresses came from.
189  Bitcoin / Development & Technical Discussion / Re: "In Bitcoin, public key are either compressed or uncompressed" on: March 01, 2014, 08:27:26 PM
Basically, it comes down to whether or not the person writing the key generator understands compressed keys or not.  There is only one reason why uncompressed keys should ever be made new, and that reason is that the author didn't know how to compress them.  Also, that isn't a very good reason.
190  Bitcoin / Development & Technical Discussion / Re: wallet passphrase caracters scape on: March 01, 2014, 08:25:05 PM
Code:
./bitcoind walletpassphrasechange '[".%q!0,q696324/98j11233"]' ["a"]\n


Also, stop that.
191  Bitcoin / Development & Technical Discussion / Re: "In Bitcoin, public key are either compressed or uncompressed" on: March 01, 2014, 08:10:57 PM
Search is not quite so useless here that it wouldn't have answered your question.

The decision is made when the address is created, or on a more meta level when the software that generates the keys is written.
192  Bitcoin / Development & Technical Discussion / Re: Why my own compiled wallets are so big in size? on: March 01, 2014, 07:57:12 PM
It sounds like the strip utility you are running doesn't understand windows binaries.  Maybe find one that does?
193  Bitcoin / Development & Technical Discussion / Re: Paper Wallets How Doth It Work? on: March 01, 2014, 06:00:01 PM
A good understanding of bitcoin in general seems to be both a necessary and a sufficient condition for redeeming properly designed paper wallets.

You must understand that bitcoin spends old transactions into new transactions.
You must understand that transactions are redeemed in entirety.

A firm grasp on those two concepts will be sufficient for most people.  Things get a bit more complicated if your paper wallet uses P2SH multisig (which it totally should).
194  Bitcoin / Development & Technical Discussion / Re: why did bitcoin choose secp256k1 over secp256r1? on: February 28, 2014, 12:00:18 PM
based on this site http://safecurves.cr.yp.to/ secp256r1 (P-256) is not safe, but neither is secp256k1. Of course, it's debatable how trustable this claim is.

Curve25519 is said to be safe and there's also some other new ones assumed to be safe.

If you search this board for that URL, you'll find at least one thread, maybe more.  The short version is that djb has a huge ego.  The long version is that the things he dislikes about secp256k1 don't matter, or at the very least, don't matter to us.
195  Bitcoin / Development & Technical Discussion / Re: Why my own compiled wallets are so big in size? on: February 28, 2014, 06:10:52 AM
Are you sure you stripped the binary?
196  Bitcoin / Development & Technical Discussion / Re: Mt.Gox technical autopsy on: February 28, 2014, 06:07:53 AM
Oh, right.  I forgot about another confounding factor.

Apparently gox's software didn't properly age coins before spending them.  Not normally a problem, but when the hot wallet is low, things can get interesting.
197  Bitcoin / Development & Technical Discussion / Re: Mt.Gox technical autopsy on: February 27, 2014, 12:23:24 PM
I would like to read more about this. AFAIU transaction malleability is still an open wound in the Bitcoin protocol. Understanding its implications is important.

I found this thread , Maged's post  about the Mt.Gox mess in particular, quite instructive.

By the way, Maged writes:

...
This means that it's not possible for both transactions to be in the blockchain, so people/organizations affected by this won't have to go through the blockchain to find people who double-withdrew, right?
Yes. Only one can ultimately exist in the blockchain.

He mentions that SR2 was a scam using this as cover.  It is quite possible that gox is the same.

This is my understanding, the best that I've been able to put together.

Gox's custom software doesn't always strip leading zero bytes from signature values.  Sipa estimated (on IRC) that only ~1% of gox transactions had excessive padding.

A while back, this was no big deal because the network would happily relay both forms, so any attempt at changing the transaction would result in a race.  Later, the default node behavior changed to not relay the padded version.  Once this changed, the original would pretty much always lose the race, if there was one.

Next, someone made a bot to "fix" transactions on the fly.  Quite possibly this person was sick of waiting for their money and/or was just being helpful.

So, we have 3 eras.

First, all transactions confirm normally.
Second, 1% of transactions never confirm.
Third, 1% of transactions confirm in modified form.

Only the third era is vulnerable, but it is a relatively short era.  I don't think anyone knows exactly how long it has been going on, but it can't have been years because the second era isn't that old either.

Now, to exploit this, you'd need to get lucky, or you'd need to keep up a massive circular flow out of and then back into gox.  Remember that each transaction has about a 1% chance.  So, 99% of the time that you withdraw your balance, it works fine.  And you have to wait 6 or 7 confirmations (minimum) before you can try again.  You'd get about 85 chances per year, so if we assume the third era was about a year long, figure the average attacker could have doubled their money about once in that time.

It just doesn't add up.  Someone is lying, or there are very important things that we don't know yet.
198  Bitcoin / Development & Technical Discussion / Re: Mt.Gox technical autopsy on: February 27, 2014, 03:09:45 AM
After browsing the threads about Mt.Gox and the malleability issue here are a couple of questions.

Q1. Is there any way to ascertain that the Mt.Gox bankrupcy was indeed induced by transaction malleability?

Let's say person X (attacker) withdrew e.g. BTC 666.696969 from Gox (or any other exchange). The same person X needed to claim exactly the same amount (BTC 666.696969) from Gox a week or two weeks later, right?

What could be done is to run a query on blockchain data to identify such transaction pairs, initiated from addresses that once had a fairly high value of ''total received'' (indicating they were exchange address) and sent the same amount (BTC 666.696969) twice within a certain period of time.

If someone identifies such pairs, then we might at least get the idea of the maximum possible malleability threshold that went on the Bitcoin network.

This assumes that they were replacing transactions, not balances.  This assumption may not be valid.
199  Bitcoin / Development & Technical Discussion / Re: output hash value to begin with 10 zeroes : average number of tries? on: February 26, 2014, 05:39:17 PM
More directly, you can see that hex is base 16, so 1610 = 1,099,511,627,776
200  Bitcoin / Development & Technical Discussion / Re: Using a bitcoin as means for authentication on: February 26, 2014, 12:45:19 PM
The address is to be saved and used as the key to the system right?

how do I generate this random cookie?

I take it that address variable  is the address of the user right? the return value is the signature or  the message?

This way of doing things though seems like using the address as the authenticating factor, and not a bitcoin/partherof. I was thinking of a system
where sending that specific bitcoin would grand access to the address for the system.

In that case, just generate the address yourself and present it to the user.  Then use -walletnotify to monitor payments to that address.  Unlock when the payment has enough confirmations.

If you want the transaction to purchase perpetual access rather than instant, just ask for a signing address before presenting the payment address, and tie them together in a database, then use the signmessage/verifymessage scheme above.
Pages: « 1 2 3 4 5 6 7 8 9 [10] 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 ... 195 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!