Bitcoin Forum
May 25, 2024, 04:12:32 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 [23] 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 ... 463 »
441  Bitcoin / Development & Technical Discussion / Re: Full RBF on: June 24, 2022, 10:53:11 AM
Why don't we utilize first-seen-safe RBF then? If the problem is to annoy the other party/parties by cancelling the CoinJoin or channel opening transaction, we can give a solution by accepting only transactions that spend to the same outputs, equal or greater amounts.
This was the primary way of RBF at that time when there were plans to either get FSS-RBF or Opt-in RBF on the network. There are many different risks and hassle with FSS-RBF, namely with it being subjective to the different miners and that it provides a false sense of security with no security benefits whatsoever. It was only adopted by Discus Fish (AKA. F2Pool) and dropped shortly afterwards. RBF (Opt-in or not) does not prevent fraud or anything like that, merely making it slightly harder for the average person but doesn't make them immune.

I don't foresee it to be a problem. Users generally do update their nodes, and currently 18% of the network runs 0.23 and 50% of the network runs 0.22. The number of hops that it takes to reach a miner should still be acceptable and you shouldn't have a case where it gets stuck due to nodes stopping the propagation of the transaction. Miners are generally very well connected to a myriad of nodes. However, the main concern should be whether the miners are willing to change their policy and start accepting these kind of transactions.

Peering should be a no issue because it is usually done by recognizing the service flags of their peers. It shouldn't be too difficult to have a service flag where the node attempts to connect to another which has full-rbf enabled.
442  Bitcoin / Development & Technical Discussion / Re: SHA256 once & twice on: June 19, 2022, 03:52:58 AM
So I generated a 128 bit number by clicking 1s and 0s just using my head. 50/50. not the easiest thing to do but not impossible either.

By looking at the source code I could probably figure out how to improve my results even more. Because there is no way to define "random" to a computer so that it recognizes what is random and what isn't.
Yep, so the program didn't manage to guess that sequence of numbers and it was random (intentionally or not). Sample size can skew the results quite significantly, but I think the program can do more as well. If you were to do it over longer periods of time or take a bigger sample size, then you are more likely to tend towards the computer winning/losing. Anyways, anything above/below 50% shows a short term sequence so that is undesirable. If they took a bigger sample size or used a RNN the sequencing would actually be more obvious.

It's actually quite a simple solution and program which uses weighted average by organizing your inputs into matrices and uses it to weight and predict your next move. Hence, something like 10111000 will result in the computer giving the wrong answer every time after a few correct answers. Anyways, that's not the point, beating the algorithm isn't difficult. Having to beat the algorithm consistently without knowing what it does is more difficult for most.
 
well i think we could all agree that brainwallets are just kind of a curiousity at this point since hd wallets have taken over and really that's what someone should be using. if they want more security then just add an extended passphrase to their seed.
Agreed. I still think that general users should still realize the possible risks and caveat for brainwallets.
443  Bitcoin / Development & Technical Discussion / Re: How to make transaction never gets confirmed? on: June 18, 2022, 04:16:03 PM
I don't know what a node's relay rules are regarding nLockTime, but you could perhaps create a mineable transaction with nLockTime set far into the future.
Non-final transactions are not relayed. The locktime has to be passed for it to be accepted into a mempool.
444  Bitcoin / Bitcoin Discussion / Re: 90%+? miners can go offline right now and we would be okay? on: June 18, 2022, 01:36:31 PM
It depends, we never saw that in practice. But if miners will keep mining, then after 20 weeks the difficulty will drop four times, and then after 5 weeks it will drop again 2.5 times. That means, if miners will keep mining for 25 weeks (around 6 months), then the difficulty will adjust.

I think, even if the difficulty would drop to one, then Merged Mining that single block and doing off-chain transactions could be used as a "temporary solution", until miners will turn things on again. Because as long as SHA-256 is not broken, there is no need to change it.
Nope, we have seen it before. We have had a fairly huge drop >40% of the hashrate during the migration from China. That resulted in a huge sell-off as well. However, people were well aware the root cause of it and it was reasonable to expect them to be turned online again. The impact of it should be magnitudes bigger, given the larger percentage.

Economic-wise, it is fairly easy to imagine what will happen. 90% drop either means the hashrate is so centralized that some disaster took them out, which is bad by itself or that miners decided collectively to stop mining. Either of them will almost definitely result in a sharp drop in the price. The remaining miners which were still profiting at the current difficulty will shut down. This results in a >90% difficulty drop in all. Even if you were to take into account, by considering the total difficulty drop, you will still see a very significant crash in price. Miners are the backbone of the network and having 90% of them leave (ie. industry being worth tens of billions) is not a good look for Bitcoin.

Furthermore, because every Crypto is in essence tied to Bitcoin, the little (and potentially diminished) profits in merged mining doesn't warrant enough for anyone to really turn their miners on. So, I would believe that the protocol will survive and function but not the economy.
445  Bitcoin / Development & Technical Discussion / Re: How to make transaction never gets confirmed? on: June 18, 2022, 01:28:36 PM
If your transaction can be seen on the network, then it should be valid by consensus rules. Even if all of the miners were running custom implementations, so long as someone is compliant with the rules, then your transaction will be mined.

There are of course ways to slow this down;
1) Having a transaction with high sigops. There was a way to exploit the sigops limit such that most mining pools prefer other transactions over yours. This makes it less desirable to mine your transaction. However, there is a sigops limit and this isn't a problem anymore.
2) Pay a lower fee, miners won't want to mine it.
3) Exploit the standardness rules across mining pools. IIRC, certain mining pool had a different standardness rule that resulted in them not wanting to mine specific transactions. I can't find the material for this but IIRC it happened before (not related to SatoshiDice censorship).

All in all, if your transaction is non-standard, it won't be mined without a miner explicitly doing so. If not, then your transaction will always be mined.
446  Bitcoin / Hardware wallets / Re: Coldcard on: June 18, 2022, 10:33:14 AM
If I understand correctly, all hardware wallets need to have NFC chip built inside them, so Coldcard is not different from them in some special way.
You need to have two devices with NFC chips that can communicate with antennas between each other, first device is smartphone with NFC chip, and second device is hardware wallet with NFC chip.
Good thing would be to make some comparison review and see how all NFC wallets work in real life scenarios.
Most hardware wallets don't have NFC chips. They are only necessary for wireless transfers, AFAIK both Trezor and Ledger doesn't have it. The cards that you see are not hardware wallets, and IIRC Ledger was about to launch one but the cards weren't very useful as the chips require too much power for NFC.

NFC is just another way of transferring data, so nothing really revolutionary or surprising.
447  Bitcoin / Bitcoin Discussion / Re: 90%+? miners can go offline right now and we would be okay? on: June 18, 2022, 06:28:05 AM
All the remaining miners could just take out their old S9s, Newpacs, and Apollos to somewhat offset the loss in hashrate (as long as the difference would bring it up to somewhere below a 50% loss, right?

Obsolete gear is probably not going to put a dent in the hashrate unless its used in large formations.
Nope, they are unprofitable. You won't see any of those hardware getting turned on until at least the current epoch has passed, and even so it depends on when the hashrate changes and if the price maintains.

Economic-wise, you will likely see the market crash as well and for a good reason. Having 90% of the hashrate turned off means that the most important economic agent has lost trust in Bitcoin and there is no reason why any of the other market actors would be interested in this. Then it becomes a cycle, where more miners turn their ASICs off, so on so forth. You would see even larger decrease in the hashrates. Bitcoin won't survive.
448  Bitcoin / Development & Technical Discussion / Re: SHA256 once & twice on: June 18, 2022, 06:21:29 AM
But they can generate 256 bit numbers using their brain and a pencil and paper by writing down a string of 1s and 0s. And that number has never been seen before. They can also think of phrases that do not exist on any book or search engine so no one ever thought of that phrase before. Since you don't know how an individual mind is biased, you can't use that to gain any idea into what passphrase they might have come up with.
Be my guest: http://www.loper-os.org/bad-at-entropy/manmach.html.

Your different phrases likely already exist in the dictionary and specific permutations of it are likely to be inter-linked with real life events. Your brain works in a way by association, so you are likely to think of something that you've already seen before. It is a natural phenomenon that has been studied and proven.

You don't need to go down to the quantum level or use a computer to get randomness. in practice, when the rubber meets the road and for the purposes of generating bitcoin addresses, dice rolls can suffice. they might be a bit inconvenient but that's neither here nor there...
Yep. Dice rolls are sufficiently random given a large enough number because even with a 256bit entropy, your decrease in entropy can still make it sufficiently difficult.

That's why you have to "upgrade". Someone that doesn't keep up on the current state of security might end up with a nasty surprise oneday no matter what method they used to generate their bitcoin address. For example, people that used Sha256 as a brainwallet. Hopefully they got the memo that this is a very insecure thing and their funds should be moved.
I bet that if you use a sufficiently big random number generated by a CSPRNG and insert it into Brainwallet, it would still be secure. The whole point isn't about which KDF is stronger, because they're all going to become weaker as technological advances progress. The one thing that never really changes is that 2^256 or 2^128 is a very big key space and is likely unable to be exhausted. The same cannot be said about the improvement in speeds of KDFs.

Well ideally in a software, the user could configure the # of iterations or difficulty level. Some people might want their difficulty level to be off the charts so that it takes 30 minutes on a top end computer to just generate the private key and address. Who's to say they are wrong? Bitcoin paper wallets are to be used one time anyway so it's not like someone should be needing to enter their passphrase and go through that intensive process except once to create and once to spend.
Sure. Then you are making this entire process unnecessary difficult, and there is no guarantees of security. Why? How do you know your "iterations" or n values are sufficiently high? Not like I'll publish my most optimized implementation for everyone. It's really quite stupid to have to wait minutes to generate a single address.

The key space is big enough. 2^256 almost. The algorithm is the only reasonable/feasible way an attacker has of determining my little private key out of that whole key space since it's so freaking huge. So the algorithm needs to punish the attacker for even trying. Punish him every time he tries to make a guess. That's kind of the theme behind warpwallet I would imagine.
Nope. Your keyspace is only 65 bits, you mentioned it yourself.

Your keyspace is only that if you use a passphrase that is completely random and sufficiently big. And yes, that is the whole point of warpwallet but if the input entropy is either:
1) Predictable
2) Short
, then I've got a better shot at cracking something as opposed to the costs.


Brainwallet passphrases are supposed to have some type of meaning to their owner. Otherwise it would not be possible to store it in their well, brain! you're confusing secrecy with randomness. A passphrase which is secret would be something that you cant search in google it doesn't show up in any searches. no one ever wrote down the phrase in a book, no one ever will except you. that's doable even though you don't think so.
Precisely why the whole argument revolves around brainwallet. Most people simply cannot make these kinds of passphrase. You underestimate the ability of humans to not think by experiences and association. Unfortunately, the reality is often very different from what you think. Search engines are not comprehensive and they are most definitely not a dictionary.

Again, brainwallet passphrase is not supposed to be some random string of characters because get this: no one can remember that.
So a passphrase with a specific pattern.

Well I disagree with that statement completely, as I've pointed out before that I find mnemonic seeds to be devoid of any meaning thus impossible to memorize. And trying to create meaning out of something that has no meaning is pointless because you will forget it soon enough. Not so with a brainwallet passphrase because in that situation you get to pick and choose your words and stuff so that it has some type of meaning to you.

Also let me throw in the opinion that mnemonic seeds are good for one thing and one thing only - for stamping in steel.
Then you introduce another risk vector; how can you create that is
1) Sufficiently long
2) Sufficiently unique
3) and also prevent yourself from getting into an incident which induces amnesia or a form of it.
It is a risk that I would very much not have to face.

I don't know anyone that ever used that technique and I guarantee you it is more complicated than just trying to memorize 12 words. I saw that article in the past and it struck me as being overly complicated and not going to work.

How could anyone ever remember a story like this word for word? They're in for unwelcome suprise oneday when they forget the words to their convoluted and unintelligible "story".
Sounds like the same problem that would occur with your memory problem. I'm not going to comment further about the memory issue, because things like these are certainly doable and there really isn't a need to memorize in the first place. If you want, you can certainly do it. You definitely don't need a brilliant memory, spaced memorization is surprisingly effectively, for what its worth.


If you trust that you can make a passphrase with sufficient entropy, then go ahead. You won't really know if it is secure until it gets hacked anyways. I, for one am definitely not doing something like this, especially with so much money on the line.
449  Bitcoin / Development & Technical Discussion / Re: SHA256 once & twice on: June 17, 2022, 11:29:16 AM
Sure you can. If all possibilities are equally likely and there are 2^n of them then the entropy of the system is considered to be n-bits.
That is kind of the problem isn't it?

Humans can't generate anything without bias. It is an inherent trait and the best that we can do is to try to approximate using known random substances. However, there is also another problem; most of the variables in nature is predictable, things like Radioactive decay with Heisenbergs Uncertainty can be approximated to be random but that isn't accessible in normal computers. That leaves us with urandom but even that isn't strictly random (random enough but still susceptible to minute interference), so you can't accurately measure entropy still.

I doubt there's a rainbow table for it. And even if there was, just use salt.
Sure, but that doesn't prevent bruteforce from happening. Using a salt would just be a concatenation of the two components, which would prevent rainbow tables but nothing else.
It could be. it might not be. it all depends on how hard it is to enumerate all the possible 2^65 states. That's why using Sha256 as a brainwallet is not as secure as something like warpwallet. it takes longer to enumerate the states. i think some of the parameters like N=2^18 in scrypt you could increase if you wanted to make it even harder.
I think that is well established, that KDFs like Scrypt is way better than SHA256 with brainwallet. Countering ASICs or bruteforce speedups with a parameter change doesn't do enough; you still leave tons of addresses vulnerable. Now, there is also a problem with resource scarcity in systems; if you increase the parameter far too high, you risk having certain users taking longer than normal to access their wallets.

I doubt there's many addresses out there built with warpwallet but I dont think it would make a difference if there was. If ASICs get more powerful you can just bump up some of the paramters in scrypt like N. Put it out of reach for them once again.
Addressed this previously. ASICs has gone past the stage of only having a few MB of ram. If you increase it too much, you make it difficult and time consuming for certain people to get to their wallet. If your security is reliant on the algorithm rather than the keyspace, then I would urge you to reconsider and re-evaluate your risks.

Well for one thing it is impossible to memorize a 12 word mnemonic seed. Show me someone that has done that and 5 or 10 or 15 years later, they will have forgotten it for sure. Now a passphrase can be constructed such that it has some type of meaning to it so they are less likely to forgot it.
Then isn't there a problem here? If there is a certain meaning to it, then it is probably not so random and that defeats the whole point of a brainwallet. So that leaves you with a single solution; using a random method to generate your passphrase. Then why bother going through brainwallet? Your mnemonic seed is far easier to memorize because there is a pre-defined word list and that you can easily construct a sentence with it.

Right. That's one benefit. Is that you can actually memorize a passphrase. Good luck doing that with a meaningless string of 12 words.
Here: https://blog.trezor.io/how-to-memorize-a-seed-phrase-building-narratives-from-nonsense-a306e48dfb39. The entire point about these 12 words is to allow you to construct your own stanza. Also, the whole point about whether memorizing something would be effective has been discussed earlier in the thread as well.
450  Bitcoin / Development & Technical Discussion / Re: SHA256 once & twice on: June 16, 2022, 02:40:07 AM
an 8 character passphrase has about 65 bits of entropy. a normal computer is not going to be able to crack that. plus if we salt the passphrase with the user's email address then they would have to know the person's email address to even get started. That makes things way more difficult.
That is not what entropy means. There is no way to measure entropy because it is the degree of randomness and for which you can't see how random something really is. Passphrases are certainly not defined by entropy; you can have the most sophisticated and random passphrase that you can think of, but so long as there is a rainbow table that contains that permutation of it, then you're no better than just using correct horse battery staple.

65 bits of entropy is not a lot.

No I'm not saying it is not safe. It seems safe. Cracking a warp wallet is not like cracking a normal brainwallet. it's alot more time consuming and expensive in terms of computing resources. So you're not going to be able to crack an 8 character passphrase even without a salt to say nothing of one that has a salt. There's a reason why those last 2 challenges didn't get solved its probably because it is technologically infeasible. We know it's infeasible to do by brute force.
It has been 4 years and there are tons of ASICs that has shown capabilities of implementing memory hard algorithms. A challenge like this isn't really worth the time, because you're cracking only one specific address. If we have thousands of wallet like these, then there will be incentives to improve on those programs and we'll have even faster and more efficient bruteforcing.

Brainflayer was introduced many years after the inception of brainwallet and it has shown that Brainwallet was a very weak implementation. There is no guarantee that a better and more optimized program would surface in the future given enough traction.
Well a 20 character passphrase I think gives a bit higher than 128 bits of security. That's because its universe of possibilities is greater than 2^128. So it's reasonable to assume that you can reach every single bitcoin address from using 20 character passphrases. But yeah, Bitcoin is limited to 128 bit security.

Well none of those links you shared shows anything having to do with warpwallet itself. so not sure what you're talking about...

Sure, you can but what would be the benefit of a brainwallet as compared to a simple 12 word mnemonic that is guaranteed to be random by implementation?

The only possible benefit that I can see using these implementation is if that for some reason you are able and willing to memorize a 20 character randomly generated passphrase rather than a 12 word mnemonic.
451  Bitcoin / Development & Technical Discussion / Re: SHA256 once & twice on: June 14, 2022, 12:21:36 PM
which proves it is pretty secure. the drawback to something like warp wallet and really any sophistocated brainwallet scheme is you are trusting the software. do you really understand it well enough that if the software went away you would be able to do a clean room implementation of its algorithm so that you could use that instead? if not then that's honestly a bad sign.

for example how do you know it doesn't have a bug in it and so when you do your cleanroom implementation if it, your version doesn't have that bug so yours is technically correct but that's not going to help you recover your private key unless you can reduplicate that bug in yours which would be impossible most likely.

Look at Burden Of Proof. The only real evidence is that it is both time and resource consuming but it doesn't mean someone with decent resources won't crack it or if someone uses weaker than usual passphrase.

Brainwallet schemes are by no means sophisticated. You can probably replicate the entire scheme easily, because you're just essentially using Scrypt to generate a key. All you need to do is to determine the algorithm and the parameters. They are generally quite well-studied so you probably won't have any bugs.
452  Other / Beginners & Help / Re: How can I get the orderly arrangement of mnemonic words after missed up? on: June 13, 2022, 08:36:35 AM
1. Can only the private key be use in back up of the wallet if the mnemonic phrases cannot be found or remember or maybe generate a new mnemonic phrase from the private key
You can use those private keys, if your funds are in there.

You cannot get your mnemonic from your private key. Your mnemonic goes through a one-way function to generate the keys. You cannot reverse the private keys to get your master private keys, your seeds or your mnemonic.
2. If accidentally the mnemonic key is missed up like the arrangement of the words are not orderly. Can it be use in any order for back up or is the a way to get its arrangements.
It has to be in the same order, but you can unscramble it. If you have 24 words and you've jumbled them up, then there are only 24! number of possible permutations and lesser after you factor in the checksum. There are ways to unscramble and get the entire mnemonic in the correct order so long as you know at least one of the address.

Don't think the checksum actually narrows it down too much, so yeah. It can be done, but it probably won't be possible.
453  Bitcoin / Development & Technical Discussion / Re: SHA256 once & twice on: June 13, 2022, 08:32:24 AM
Could you give any example of "other kind" of brain wallet?
For sure single sha256 (bitaddress etc.) is the most popular. Until recently I was not aware of ETH brainwallets (single keccak256 or 2031*keccak256 from ethercamp). Was there something like that for BTC? And how about restoring that kind of wallet, because I guess even if there was other number of loops or salt used, it had to be public for restoring using 3rd party tools.
After the initial brainflayer fiasco, the original brainwallet was shut down. There were variations of it such as brainwallet.io and warpwallet which both uses Scrypt and salt to enhance the security. It wouldn't go as far as to say that they are uncrackable; given sufficient resources and common enough phrases and passphrase it can be crackable. The most infallible method is really to just use BIP39 or similar mnemonic systems.

There are ways to crack them and tools to do so. Just that they are significantly slower (and more expensive) than single round SHA256.
454  Bitcoin / Bitcoin Discussion / Re: Act to defend privacy or resign ourselves to its loss? on: June 13, 2022, 06:03:09 AM
Is the BTC community really going to succumb to all these measures without a fight? And I mean put up a genuine fight, not a "phony war" or half-hearted struggle.

So you want to save BTC's functionality? Then everyone should run CoinJoin nodes en masse. Replace zkSNACKs with 3rd party coinjoin nodes and share them on reddit, bitcointalk, and other places.

Want to accomplish big things? Then decompose it to small steps and accomplish those. Wasabi's, and specifically zkSNACKs, initiative can be thwarted by the community by running independent CoinJoin services on random leased servers.

But it will *only* work if dozens of people do this. Perhaps even one person running multiple nodes. So people must symbolically take back their privacy (to use Wasabi's words) by running their own CJ nodes and putting them inside Wasabi.

And if they try to change the source code to forbid this, then we shall fork it to preserve or enable that functionality.

Privacy is a fundamental right, and we can't allow govs and corps to take BTC from us by making it more restrictive than cash and bank accounts.
That is wishful thinking. Bitcoin isn't designed to provide privacy, though the nature of it does provide some privacy.

The reality is that majority of the Bitcoin users actually doesn't care about privacy. Even if you do, there is nothing much you can actually do. Regulations, as it stands currently is sufficient and palatable for most Bitcoin users because there is no such thing as going dark or leave no actual digital trace in the internet. This is moreso with Bitcoin, perhaps you can get more privacy with privacy coins, but that is it. People who cares about privacy wouldn't really be using Bitcoin when there are alternatives.

These policies (AML/KYC) as it stands act as a relatively okay deterrent against illegal activities provided that sufficient screening is done. I'm all for a suitable compromise with government policies and this "intrusion" of privacy, because after all, if you're using an exchange then you probably don't care about privacy. I'd very much rather have the government reaching this compromise and the middle ground rather than clamping down hard on crypto because they cannot fulfill the basic social obligations and these illicit activities start running rampant.
455  Other / Beginners & Help / Re: Can a brain wallet be trusted? on: June 13, 2022, 05:44:02 AM
You could add a "salt" to a "normal" brain wallet: after your password, add for instance your real name. That makes it impossible to brute-force it together with all other brain wallet users out there.
Not exactly. Adding a salt is not enough if your algorithm is naturally fast and weak; reaching your specific permutation would likely just be a matter of time (albeit longer, but still easier than other algorithms because hashing SHA256 is not really that difficult). Regardless, that is not what I'm advocating for and while it does make for a difference in the difficulty, it does not, by any means make it expensive or impossible to crack.

Instead, what I'm advocating for is to use Brainwallet with a resource intensive KDF and salted. Doing this gives you the best chances; it is far, far slower to crack if it is memory-hard and it makes more sense to go through dictionary or known wordlists in that case with common salt permutations. When compared to the original brainwallet, the choice would be a no-brainer.
456  Other / Beginners & Help / Re: Can a brain wallet be trusted? on: June 12, 2022, 06:08:30 PM
I think that it is still important to acknowledge that the brainwallet implementation was inherently flawed with a fairly weak KDF that resulted in an extremely fast bruteforce and balance checking which resulted in very efficient and effective implementations like Brainflyer to exist. Which accounts for this impression that brainwallet simply doesn't work.

However, more recent implementations uses a far slower and intensive algorithm which limits the effectiveness of the bruteforce as it would require either high memory intensity or resources. In addition, salt is mandatory in most implementations which makes for an additional round of protection. Fact is, while such algorithms cannot beat the entropy of your OS, you'll still have a fairly decent security as any attempts would be far more than a generic bruteforce but they would also have to take into account the salt, which is personalized and unique. Caveat being both your phrases as well as your salt has to be unique and sophisticated enough.
457  Other / Beginners & Help / Re: Can a brain wallet be trusted? on: June 12, 2022, 12:09:07 PM
No. Humans are naturally not good at creating complex and secure passphrase. More often than not, you end up creating addresses with poor entropy. If you need an easy way to remember the passphrase, then you can just use a wallet with a mnemonic. The generation of mnemonic is secure with a good entropy.

458  Bitcoin / Bitcoin Technical Support / Re: Coinbase tx to multiple addresses on: June 11, 2022, 03:46:23 AM
Interesting to note that there is a caveat tied to this, when mining pools directly reward the miners using the coinbase transactions. These transactions have a threshold of 100 confirmations, so you can only spend the inputs from these transactions after the 100 confirmation, which is actually fairly long. A more direct method would be to send it to their own address before distributing it afterwards. The good thing is that they can include their own transaction in a subsequent block that they mine.

That is also why most exchanges don't recognize these deposits automatically. Most mining pools credits their miners after 6 confirmations and uses the older "generation transaction" to payout instead of having their miners wait for additional 100 confirmations.
459  Bitcoin / Electrum / Re: How to decrypt electrum wallet encrypted file backup? on: June 10, 2022, 12:58:43 PM
I used this method for the unencrypted means to backup the file. But what about if I backup the wallet encrypted and my laptop is damaged and I want to recover through encrypted backup file. Is it possible to buy another laptop, recover the private keys from the encrypted file backup if I download electrum on the new electrum wallet downloaded on new laptop?

Though I will have my seed phrase too in case that does not work.
It will. The password will work so long as the file is uncorrupted, no matter where you decrypt it.

I would be more comfortable with using the seed as a backup method. It would definitely work and there is no reason why backing up the file would be better than it, unless you need the labels and stuff like that. I would probably avoid exposing the seed so much as well.

If you're looking for a method, just make sure the wallet file is unencrypted (with the encrypted keys) then extract the encrypted seeds. Afterwards, just use OpenSSL or similar utility and decrypt it with AES-256-CBC.
460  Bitcoin / Bitcoin Discussion / Re: Is Bitcoin mining a zero-sum game? Or is it a race to the top? on: June 09, 2022, 11:12:48 PM
When you look at introduction of new ASICs, the miners who have lost some of their profits are still making profits. No one mines at a loss. And the very definition of zero sum requires that someone loses as much as others gain. So the race of equipment is a zero sum game, but mining itself is not. I think we should separate mining from ASIC technology, to not create confusion about zero sum game.

Imagine someone decided to mine with a severely outdaed equipment - they would be spending on electricity much more than the value of coins they find, but this loss won't go to miners with never equipment, as the definition of zero sum game requires it to.
That would be an inefficient market allocation. In a logical and perfect scenario, each miner mines at the optimum MPB/MPC and that is the market equilibrium.

This makes it such that a smaller change actually makes it more rational for a miner to either scrap and sell it or to turn it off. The phenomenon which the miner actually finds it more efficient to mine at a specific point in time would then be a market failure due to the time lag or lack of perfect information. Hence, in essence the market logic would still apply, but it gets more skewed in the real world.
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 [23] 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 ... 463 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!