if you can double your bitcoin in any way i'm sure the price will tank to 50% of current price long before you can do anything It won't work.
If XT is adopted, XT wins, there's no other chain, or at least there's no other chain with value.
You may find someone that lived in a cave for the past year and scam them using the abandoned chain, but that's not something you'll want to brag about, I think...
what happen if both chain hold 50% of the network?, it's like having a bitcoin with half the network and a new altcoin that want to be bitcoin 2.0 Fork doesn't occur under those conditions. People's choice will be clear and every service will update software in proper time if a fork does occur..
|
|
|
It won't work.
If XT is adopted, XT wins, there's no other chain, or at least there's no other chain with value.
You may find someone that lived in a cave for the past year and scam them using the abandoned chain, but that's not something you'll want to brag about, I think...
|
|
|
Hi.,
How can we claim or spent the unspent bitcoins that are lodging as unspent transaction in Blockchain...?
Thanks
You open your wallet and send those coins to where you want to, you spend the coins... You can only "claim" coins if you have the private key of the address.
|
|
|
Even if someone was really trying to create a blacklisting mechanism to be used in bitcoin, I don't think it would be possible due to the nature of the system, in a centralized system like Ripple it can be made, not in bitcoin.
Can you elucidate us on how this could be achieved?
Isn't it obvious? We can see every address that coins go to, or come from. Even passing thru a tumbler taints the outputs to some extent. It is not obvious, can you explain how it would work?
|
|
|
I am in a small city and we dont have Bitcoin atm at the moment. I just registrated to www.kraken.com...Is this site Good? Can I buy with my debit card in kraken? I don't think that option is available, you need to make a deposit/transfer.
|
|
|
Even if someone was really trying to create a blacklisting mechanism to be used in bitcoin, I don't think it would be possible due to the nature of the system, in a centralized system like Ripple it can be made, not in bitcoin.
Can you elucidate us on how this could be achieved?
|
|
|
Very unlikely, one does not steal a shitload of bitcoins from illegal business and go dump them in exchanges, well, you can but you'll probably get caught.
It seems the crash was caused by something called "margin call" in bitfinex...
|
|
|
It seems like the second block has been mined aswell looking at this : http://xtnodes.com/xt_blocks.php , when we are supposed to upgrade to XT though ? I know it's on January and stuff however do we need 75% nodes running or we need 750 block mined from 1000 You can change now if you want, fork is only triggered if those conditions are met, if they don't, nothing happens.
|
|
|
I also fail to see the correlation, can you point to the video or article?
|
|
|
While having a high-capacity set of full nodes increases the on-blockchain transaction rate, the requirement of full nodes to be high capacity has a centralizing effect.
It was meant to be like that from the beginning...
|
|
|
What is that of blacklisting?
I don't understand it really well
It's basically DDOS protection. Yes, except who has the power to alter who is classified as an "attacker"? Once you can blacklist an IP can't someone decide to apply to it anyone? Mike is the first to admit the code isn't good, if you have a better proposal please submit it, I'm pretty sure Mike will approve it.
|
|
|
It seems this is also relevant in here, Mike Hearn's words: You seem to think I hate Tor. I am actually the maintainer of a full blown Tor implementation (Orchid). I've done a lot of work on integrating it into bitcoinj and I'm basically the only guy who can actually move the needle on Tor/Bitcoin usage, by enabling the use of it by default in consumer wallets that have hundreds of thousands of installs. We're not there yet (it's still too slow) but we're a lot closer than before.
This doesn't change the fact that Tor is heavily abused. It can be useful but it's a frequent source of attacks of all kinds. So finding ways to get the good without the bad involves some tricky coding.
Below, you say "anyone can jam the network with just two IP addresses". Yes, that's unfortunate isn't it. I've been sounding the alarm about Bitcoin Core's poor DoS protection for years. Nobody listened, that's why I have now written a new anti-DoS system that can handle this sort of thing. It starts by clustering and deprioritising Tor because we've seen actual jamming attacks that came through Tor, and because using it is a lot safer and more convenient for an attacker than using your own IP addresses or using a botnet. But it absolutely should be extended to have more advanced heuristics. Instead of whinging that (gasp) loading a file from a web server is "insane", maybe you should be writing code instead. https://news.ycombinator.com/item?id=10048768
|
|
|
Can you point out exactly where the blacklist code is, and if the blacklist mode is hidden how do you know it's there?
Please explain how the code does that.
|
|
|
Mike Hearn is not pushing blacklists. It was an idea 2 years ago, which was abandoned shortly after
But right now he added blacklists for Tor in their XT client. Didn't he ? Do you understand how anti DoS attack work? I expect much better from you Zeroday, i think you should not listen to chanting "blacklist IP, blacklist coins". Yes, I know how does DDOS work and can confirm that blocking Tor is stupid and ineffective method. There are huge botnets around with over 15K IPs each, that you cannot identify because, unlike Tor nodes, they are not listed somewhere. If someone wants to run devastating DDOs again bitcoin network, they will succeed without help of Tor. You seem to think I hate Tor. I am actually the maintainer of a full blown Tor implementation (Orchid). I've done a lot of work on integrating it into bitcoinj and I'm basically the only guy who can actually move the needle on Tor/Bitcoin usage, by enabling the use of it by default in consumer wallets that have hundreds of thousands of installs. We're not there yet (it's still too slow) but we're a lot closer than before.
This doesn't change the fact that Tor is heavily abused. It can be useful but it's a frequent source of attacks of all kinds. So finding ways to get the good without the bad involves some tricky coding.
Below, you say "anyone can jam the network with just two IP addresses". Yes, that's unfortunate isn't it. I've been sounding the alarm about Bitcoin Core's poor DoS protection for years. Nobody listened, that's why I have now written a new anti-DoS system that can handle this sort of thing. It starts by clustering and deprioritising Tor because we've seen actual jamming attacks that came through Tor, and because using it is a lot safer and more convenient for an attacker than using your own IP addresses or using a botnet. But it absolutely should be extended to have more advanced heuristics. Instead of whinging that (gasp) loading a file from a web server is "insane", maybe you should be writing code instead. https://news.ycombinator.com/item?id=10048768You could also write some code instead of just keep bitching about it.
|
|
|
I support blocksize increasing idea, but not in a form of fork such as XT, which besides block size has some shady unannounced privacy affecting features such as Tor blacklisting.
IMO, everything must be done inside Core client.
Introduce the beginnings of anti-DoS resource scheduling.
This adds code that takes effect if a node gets completely full (this should never happen unless there's an attack or the number of nodes falls dangerously low).
Peers now have a priority that attempts to estimate their importance. Currently it is just based on IP address. The default score is zero. In future it may take into account things like how many blocks were relayed, etc. When a node reaches its max connection slots, it will attempt to find a peer with a lower priority than the one trying to connect and disconnect it, to stay below the max connection limit.
Peer priorities are based on matching the connecting IP against a set of IP groups. For now, the only IP group is one that gives Tor exits a score of -10. This is to address DoS attacks that are being reported on the main network in which an attacker builds many connections via Tor to use up all the connection slots and jam the node for clearnet users. It's a more robust approach than simply banning abused proxies altogether.
The code has both a static list and a list that's downloaded when the node starts.
Other anonymizing proxy networks that are attractive to DoS attackers may also be added as alternative IP groups, as a quick fix. Eventually peer priority can be calculated in a more free floating and dynamic manner and the hardcoded IP approach may become unneeded. https://github.com/bitcoinxt/bitcoinxt/commit/73c9efe74c5cc8faea9c2b2c785a2f5b68aa4c23Seems reasonable, if this is what you're talking about...
|
|
|
sharknado waste my time
Heresy! Sharknado is awesome! #AprilLives
|
|
|
What was your rationale to elaborate that cartoon?
Do you think mining would be more profitable with XT?
|
|
|
|