Make no mistake, quantum computing is a threat towards anything secured by public-private keys. The amount of qubits required to break ECDSA is above a thousand and currently, there isn't any quantum computers that is close to that, without running it for longer periods of time and without errors.
It's not hard to design a new algorithm to secure the signatures but the harder part should be about securing the addresses with coins and were P2PK.
|
|
|
I run two full nodes, if I was ever to get fed up with doing so & decided to change to prune node on one or both computers would I have to resync or download the entire blockchain from scratch?
No. The nodes just need to delete the block files from your computer since it has basically gotten everything that it needs from the synchronization prior. The reverse is true however; you'll need to resynchronize if you want to disable pruning.
|
|
|
How would he be able to spend an input that hasn't been confirmed? won't the transaction be invalid at that point?
Nope, it's valid. The rule pretty much only dictates that the inputs must be referenced and confirmed. It's fine to have an unconfirmed input as long as it is confirmed in the same block. I don't know for sure, the recipient claims so.
perhaps I should put in more details, my friend was asked to solve a dispute between a buyer and a seller, the buyer is 1GpuDxXn9mYUf3fiMy4YpvTgx7AKUsZbbV, he paid in cash for 0.09 BTC, his wallet now shows empty, the seller has a proof of over 60 confirmation while the buyer "claims" not having received anything.
So long story short, my friend is waiting for me to tell him to whom the cash should be given since both parties denied ownership for the last receiving address 1GpXLNYGfi7jWgZxn7hDaQs39VD59WYtvg
As long as the coin is confirmed and sent to the specified address, the deal is complete. I regard any deal which has a valid transaction to the specified address as complete. Whatever happens after that is out of the control of the sender. What wallet is the recipient using? It does matter in this particular situation, if the buyer said that was his address then there would have been no dispute, but I agree that in general, it doesn't matter.
If the funds were sent to the correct address as dictated, there is no dispute. Wherever the funds are sent to is a separate matter entirely.
|
|
|
It's likely just that someone has a script which automatically crafts a transaction to send the funds immediately to another address upon seeing it, confirmed or not. Both transactions were included in the same block
How would you know if the other address doesn't belong to the same wallet btw?
|
|
|
1.)As a matter of risk mitigation,if some government/non government hackers cut of mining pools from network through internet disruption 2.)Physical shutdown by fraud/insider work 3.)natural calamity like earthquake.
How BTC network manage 50% + attack?
I am sure these scenarios are well taken care. Can some one throw light on this dark topic?
Bitcoin doesn't have any measures to counter a scenario whereby a huge portion of the hashrate gets taken out, resulting in longer block times. Bitcoin difficulty has a limit to safeguard huge difficulty drops and it could take a few difficulty adjustments before the difficulty returns to normal. I doubt there would be a great decrease in the resources used to execute a 51% attack. Mining operations, though concentrated within China shouldn't be concentrated within the same place. Malicious actors, can however use the hashrate to execute any attacks against Bitcoin.
|
|
|
I just received the fake error message in Electrum 3.3.4. Here is the malicious website: https://www.electrumdigital.websiteDoes it make sense to give this to the ElectrumX team, so they can blacklist this address? No. Electrum doesn't control your web browser so they can't restrict you from viewing the website. There is also no filtering on the things that you can display in that dialog box.
|
|
|
Full client wallet like bitcoin core download the whole bitcoin blockchain from the scratch to the recent time, but that is not the reason they run full node, they run full node by fulfulling the concesus rules. In the blockchain are blocks, the full nodes download the blocks and also including transactions that miners picked at certain time into each block at a specific time which is usually 10 minutes on average. If the prone node only download the blockchain of a specific recent time, that does not mean it will not run full nodes as long as it is fulfulling the concensus rules.
Pruned nodes and Full nodes are essentially the same thing to the user, but it just isn't as useful to its peers than say a full node. The block data for a Bitcoin Core client is not necessary for it to operate and it isn't used by the client very often. Unless the user is importing a new address, the client has no reason to rescan the block data at all. Pruned nodes provides the same security as a full node. They download and validate every single block but they discard those which is not needed. The size of the block data selected provides the client with a buffer in the case of a major reorg. But I don't foresee that being a big problem. I use pruned type of the full client wallet because normally the wallet suppose to be full client, but not. Bcause only the recent blockchain is downloaded and not the entire bitcoin blockchain. But, both bitcoin core and the pruned bitcoin core are running on full nodes.
Both full nodes and pruned node downloads the entire blockchain.
|
|
|
Based on the information I have read in the forum that blockchain wallet is a non-custodial, the who owns the private key owns the blockchain wallet and no one had access on it except the owner of the private keys or the seed phrase of the wallet.
Nothing stops any hackers or the operators themselves to capture the seeds/private keys by injecting malicious code. Online wallets cannot be considered fully non-custodial as there is still a good chance that the codes can be modified without your knowledge. Now, what will happen to the imported bitcoin public address with its corresponding private key to other bitcoin wallet if the imported public wallet has a balance? Could I spend the balance when it was only being imported to the new bitcoin wallet?
You need the xpriv to generate the individual keys to spend the coins. That brings the issue of having having the compatible derivation path by importing it in a compatible wallet. If you don't use a wallet with the same derivation path, you won't be able to see some/all of your addresses.
|
|
|
Look at your trust rating left by others. Your account could've gotten hacked and was posting malicious links.
'Posting Fake Miner Software download link with malware !'
|
|
|
Hmmmm.... that means Satoshi probably didn't anticipate the price of bitcoin reaching $10,000 in 10 years?
Realistically, in 2009, I don't think most people did. Miners would have large ExtraNonce values compared to regular CPU machines and this was a good indicator of the increase in Miners vs hobbyists?
IMO, yes. That's one way to interpret it though there might be other reasons why he included it. It's not defined in the protocol either. At first, most users would run network nodes, but as the network grows beyond a certain point, it would be left more and more to specialists with server farms of specialized hardware. A server farm would only need to have one node on the network and the rest of the LAN connects with that one node. If that email is indeed from Satoshi, then it would seem that they were fully aware of, and expecting, that mining would end up the domain of "farms". CPU mining is so inefficient that I doubt even a farm of CPUs could outpace a GPU by itself. For the nonce field to be full utilised, it would need around 4GH/s and that would really require quite a big farm of CPUs. I think the main concern at that time was with botnets actually, doubt the operation of server farms would outpace botnets.
|
|
|
I am now studying the Nonce field in the Block Header.
It took on average 4,295,032,833 Hashes to go below T1. The largest value that can fit in the Nonce Block Header field is 4,294,967,295.
Which means right from the start of Bitcoin, Satoshi wanted Miners to change the Coinbase Data field to include extra nonce values which results in recalculating the Merkle root and the process starts again for the next 4 Billion hashes.
Satoshi's priority was to keep the size of the Block Header at 80 Bytes I guess. I'm just surprised he didn't make the Nonce field a little bigger (64 bits) to make the Mining process a little more straight forward at the start of Bitcoin's life cycle.
Given how it existed from the start and he envisioned a system with one-cpu-one-vote, it's not hard to see why it isn't that much bigger. He probably didn't expect Bitcoin to shift from CPU to GPU and to ASICs nor pooled mining. It's pretty interesting but in the first stage of Bitcoin, extranonce proved to be a way for people to be able to track the miners. ExtraNonce increased in a predictable way which is also the reason how people manage to identify the potential satoshi addresses.
|
|
|
It's a pretty obvious phishing attempt. Hackers prey on the greed of the individual and they tend to be enticed by things like this. The best prevention is to not click on any links sent via email. If you need to click on it, check the contents and it's link after clicking it.
This is a really poor example. You can see the email addresses of others and this shouldn't be happening. BCC is often used for mass mailing to avoid violating GDPR laws.
|
|
|
I stated above I was limiting this to two a person. I will change that if this doesn’t fill up in a bit. I put you down for both 2 and 3 since you listed them first, but if you’d like to change either of those spots to a just let me know.
Plenty of spots left - ticket price .00018BTC or $2 a spot.
Ahh apologies I missed that post just now. That's fine by me thanks! TXID: 32d45fc1ece0323016a210689c1d912c1ec0d0e5824899270d584d8c6c03be9c
|
|
|
2, 3, a
Sending the payment in a lil bit
|
|
|
I'll take 0 and a. Will send when halfway full
|
|
|
That's an excuse IMO. There are very clear-cut cases of scamming, and yet the scammers never get banned. True, their trust page ends up looking like it was splattered in arterial blood, but the end result is that their account is still active and they can pull off more scams if potential victims don't (or can't) see the red trust.
I never understood why scammers aren't banned, but it's a fact I've come to accept in my time as a member here. I always keep in mind that this isn't my forum and I don't run it. That isn't to say you shouldn't try to suggest improvements, and I applaud OP for writing his post....but the sad fact is that I'm fairly certain nothing is going to change.
Flags were created to attempt to supplement the trust system and make scammers more obvious. I feel like there's both sides to a coin; on one hand, banning scammers would prevent them from pulling off more scams, on the other, banning them forces them to create a new account and continue scamming. Giving anyone the rights to ban users for scamming does introduce a potential situation with the conflict of interest. IMO, they tried to strike a balance in between by just giving the users easy access to the facts for them to make their own decisions while not banning the user completely. It's not perfect but a compromise should be made, especially in a Bitcoin forum.
|
|
|
Nothing, really. A good proportion of the transactions in the mempool are paying quite a high fee. CPFP works when a miner notices your child transaction and decides to mine both the parent and the child to claim for the transaction fee. CPFP is a voluntary option by the miner and they can choose to include or not. Judging by the current fees, I would believe that miners who are looking for CPFP transactions would be pretty enticed by your transaction. I would give it a few more hours, that's the only thing that you can do anyways. Do go to your settings in Electrum and enable opt-in RBF in the future though, the problem would've been solved easily .
|
|
|
How is it a scam?
The lack of SSL certificate doesn't mean its a scam; in fact, you can get one for free using LetsEncrypt. Unless there's a scam accusation, I can't see how this would be a scam.
Edit: They actually do have SSL certificate. Just go HTTPS instead of HTTP.
|
|
|
The entire DT system actively fights against plagiarism and ban evaders, including being severely banned, permanently. And scammers ... they are not even moderated.
I have never understood the priorities regarding bans and moderation, because the main threat to the crypto community is not plagiarists, but scammers. But no one touches them, they are not moderated, they are not banned, they are only given flags and negative feedbacks in the trust, which are not always shown. Yes, compared to what they do with bans evaders and plagiarists - these are generally benign conditions.
Any scamming incident is bound to have a two-sided story and it's not so clear cut. Trust system, though not perfect, at least allows users to comment on their trust and leaves the judgement to whoever is reading the trust. It's a lot easier to ban users for plagiarism or spam because what they're doing is wrong and the evidence is clear as day. Why the most basic and informative is hidden. It could have saved that newbie. Why hide it for forum guests?
After this story, I hung a flag for this user and now forum guests see a warning
But why not post this warning to everyone. This will not be superfluous for anyone, neither for the legendary nor for the brand new.
But instead, we get this tiny hashtag in front of the trust, why there is such a meager emphasis on hard things.
He cheated the user for money, and everything, as if nothing had happened, continues to use the forum, his trust is not visible everywhere, everything is fine and it's okay. No ban, nothing, but the poor plagiarist will grab it in full and forever. The forum is fighting the wrong people. Why is there so little information content? Why are scammers free to use the forum?
Agreed, such a system would've saved the user. However, it's worth noting that the trust system works based on the user's own trust list. It's easy to game the system if you were to show the guest everyone's trust rating; he can just spam to cover up the negative trusts. In trust-enabled sections, a warning is displayed for the guest if the user has more negative than positive ratings. The forum cannot moderate scammers; it is simply too time consuming to review the evidences and the judgement can be biased and skewed. Shitposters and copy-pasters are much easier to ban in comparison. Warning Flags were introduced to help combat non-registered users from being scammed.
|
|
|
It checks for the validity of an address. A valid Bitcoin address is also a valid Omnilayer address. I think something can be done, in a way to invalidate tether omini addresses while mistaken for bitcoin addresses. All needed is a little more of programming and testing.
If we remember the litecoin nested segwit addresses that started with 3, people also mistake it with bitcoin and has resulyed to many bitcoin been trapped and lost, but litecoin developers was able to create the M-ptefix version of the address with the same private key as the 3-prefix. That aside, also the address is not valid while mistaken for bitcoin address (although, I read this, not yet in my practical).
I am not certain, but I think there is something developers can do to make this work. Although, I used litecoin as an example, but not a perfect example though, but when not yet implemented, it can make people think such many not be possible.
You cannot change the address format of an Omnilayer address. A valid OmniLayer address has to be a Bitcoin address; the transactions are being done on the Bitcoin Blockchain itself. If the address isn't a Bitcoin address, then the transaction wouldn't work. You cannot compare altcoins with Omni. Alt coins runs on completely different network while an OmniLayer has to piggyback on an existing coin's blockchain.
|
|
|
|