There is a reason— just that it can hide the faults when your other things failed. Sort of if you assume everything is right, then no— it's no harm. But of course, if you could really get away with assuming that everything is right you would have not worried with additional entropy sources to begin with. Another reason is that it makes audit and review harder, e.g. if you can test it and confirm that it always gives the same keys for the same deck then thats a useful property to facilitate testing.
Not a reason to not do it, but it's just something to keep in mind.
|
|
|
Proof of State coin is not a decentralized currency.
This sentence is wrong in so many ways. It's insufficiently specific, but existing examples which require developer controlled block signing or closed source software don't really pass a sanity check as decentralized tools— though they're often marketed as such. You may find this enlightening: https://download.wpsoftware.net/bitcoin/pos.pdf
|
|
|
I've generally found it to be pretty easy to shuffle poorly... I'd rather throw hex dice 128 times and compress 2:1 with sha256. Even a little excess entropy plus a cryptographically hard compression function should overcome all small biases, and the order dependence in a shuffle much harder to notice or test for. The excess input also gives you enough data to perform some tests that thwart user misuse (you rolled 0 100 times in a row? really?) without compromising security.
|
|
|
Yes, but they still cost more in marginal fees, instead those transactions used priority to get them through which could have instead been used to make valid transactions... and the loss of priority will me that person must pay more fees in the future.
|
|
|
I see several of these outputs are already spent. How are they supposed to be unspendable?
They are technically spendable but they cost more in marginal fees than they are worth... It's altruistic to redeem them but not rational to do so otherwise.
|
|
|
Ah! That explains it. Several timestamps or modifications may have to be tried if no solution was found in the 232 combinations.
Several indeed: On average the network tries 16,818,461,371 modifications (each allowing 2^32 hash attempts) per block solved these days.
|
|
|
Some node ( may be not bcpool.io ) keeped it in its memory pool and relayed today bcpool.io got it, checked and included into a block.
Normal nodes do not relay old transactions... but, indeed, could have just been them not updated after all this time. The one I searched for got not hits, good sleuthing.
|
|
|
Randomness is a tricky issue. Are the Bitcoin proof of work solutions truly randomly distributed in the search space? If not, then just incrementing the test may be a suboptimal solution and a random test more efficient. If they are not in a meaningful sense and you determine how then you will have compromised SHA256— one of the best studied cryptographic pseudorandom functions. I'm unclear about how many possible combinations there are to test in Bitcoin. Surely there must be more than 232?
Mining is not a search, it's effectively a lottery. Each attempt is independent of the others and trying one does not increase the probability of your next find being a solution because you do not enumerate a finite space. Once a miner has exhausted the nonce it changes the block content (usually by incrementing something in the coinbase field in the coinbase transaction) and continues.
|
|
|
Ok, but couldn't the use of a random generator produce a correct nonce faster than the above approach?
No. It might be helpful if you explain why you think it would, since that must be predicated on some misunderstanding which we can correct, but I can't guess what it would be.
|
|
|
Blockchain.info indicates that the block with the offending TX (Block #309,740) was relayed by "Unknown 37.187.90.171" and is the only block relayed by that IP address in the last 24 hours. May I ask how you were able to contact them?
BC.i's analysis is ... seldom good. Just look in the coinbase of the block.
|
|
|
I guess I still don't understand the details of this part - is that due to them using different txs? Perhaps you could explain that a little clearer for someone like me that doesn't quite understand it.
Well one transaction in particular is always distinct: the coinbase. Every miner will be paying their winnings to a different address. In the case of pooling, pools usually put a worker-distinguisher in the coinbase field of coinbase transaction to keep the work of the hashers they are paying distinct.
|
|
|
They all start at zero (or any other number) it doesn't matter as they're all working on work which is merkle root distinct.
Wouldn't they be *repeating the same work* if they started with the same nonce? Absolutely not. They are working on block headers which have a different merkel root, always. Existing mining protocols do not even have a facility to set the nonce position/range.
|
|
|
My guess is that mining pools probably allocate a different starting *nonce* to each miner (but I haven't looked into it).
They all start at zero (or any other number) it doesn't matter as they're all working on work which is merkle root distinct.
|
|
|
There is absolute no random number generation in mining. There is no performance sensitive random number generation anywhere in the bitcoin system.
|
|
|
Yes, but I saw earlier transactions take a long time to be included in a block and blockchain lists this as received and included in a block at the same time. So I guess it had problems being brodcasted properly, but still got included in a block? Or was it mined the same minute it was created?
The times reported on bc.i are just whenever they saw it. Because this is a dust transaction that wouldn't have generally been relayed (and because bc.i themselves suppress these when unconfirmed) it wouldn't have been seen by bc.i until it ended up in a block.
|
|
|
There is an option to control binding separately from access:
-rpcbind=<addr> Bind to given address to listen for JSON-RPC connections. Use [host]:port notation for IPv6. This option can be specified multiple times (default: bind to all interfaces)
If you don't set an rpcallowip at all the default is that only 127.0.0.1 is allowed _and_ it only binds to 127.0.0.1. So if you just leave out your redundant allow statement you'll get what you want. It would probably be prudent to detect rpcallowip=127.0.0.1 and also bind only to localhost in that case— it doesn't matter, but it would avoid false alarms like yours.
Edit: After looking into making the change, I think that detecting localhost is too complex to be worth it. (e.g. correctly detecting 127.0.0.0/8 vs 127.0.0.0/1)
|
|
|
Unconfirmed non-self transactions have never been included in reported balances.
|
|
|
I've already nagged the miner in question about the wad of dust floods they just mined. If you've received some of this 1e-8 dust to a bitcoin-core wallet, https://github.com/petertodd/dust-b-gone is a good way to get rid of it.
|
|
|
11 posts in and we've gone full circle already!
He's probably just blindly posting without reading any of the messages in order to get his signature spam more widely distributed. I'm going to lock this thread since it seems like the question was asked and answered and isn't making any more progress.
|
|
|
jack u have lied so many times and u constantly delete on topic posts that cast u an unfavorable light.. only a dishonest person needs posts to be deleted..here is one for all to see. lets see if this one gets deleted too
This thread is not self-moderated, so only the forum moderators are deleting posts here. Though it ought to be self moderated, because the incessent trolling is really over the top.
|
|
|
|