Bitcoin Forum
May 26, 2024, 02:29:57 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 [29] 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 ... 288 »
561  Bitcoin / Development & Technical Discussion / Re: Selfish full node for production? on: August 12, 2020, 04:26:00 PM
maxconnections=8 // no more than the 8 outbound connections my node will attempt
That will work but disabling p2p listening would be better (also not allow inbound but will be more secure).

Quote
Setting a low with -maxuploadtarget won't work for me because my application will broadcast many transactions (possibly new to the network), so it's very important that these broadcasts are done properly.
Yes it would. maxuploadtarget only restricts fetching historical blocks, it won't restrict anything about you sending transactions.

Quote
@JuleAdka suggestion seems interesting. I took a look at BIP 159 (https://github.com/bitcoin/bips/blob/master/bip-0159.mediawiki) which introduced NODE_NETWORK_LIMITED. Disabling NODE_NETWORK might be a good way to make sure nobody tries to download historical blocks from my node. Is there a way to disable this service flag? Searched through the options and didn't find a way to do it (bitcoind --help | grep "service").
Yes, enable pruning. You can set the pruning limit so high that nothing actually gets pruned, but you'll still signal yourself as pruned to the network. An option should probably get added to do this more directly, you should open a feature request for a "-nodelimited=1" option.

What you signal is mostly moot however, if you're not even listening for connections from outside.
562  Bitcoin / Development & Technical Discussion / Re: Selfish full node for production? on: August 11, 2020, 11:49:36 PM
You can set an amount of upload limit per day very low with -maxuploadtarget.

You can also reduce your maximum connection count, which will reduce traffic a lot.


You can also run a pruned node, which will cause you to not serve historical blocks at all.  This is the best.  I'm not sure if there is a flag to set node-limited while still actually having all the blocks... there should be. (perhaps setting pruning with an absurdly high pruning limit is sufficient).


There are plenty of nodes on the network serving historical blocks, it's not particularly selfish to not do so. 
563  Bitcoin / Development & Technical Discussion / Re: Segwit Questions on: August 11, 2020, 02:12:39 PM
However, how does scriptSig: OP_TRUE unlock the original Pre-Segwit input UTXO A with scriptPubKey: OP_DUP OP_HASH160 404371705fa9bd789a2fcd52d2c580b65d35549d OP_EQUALVERIFY OP_CHECKSIG on the Non-Segwit node? 
It doesn't. Segwit style signing is only used for segwit style outputs.  Old style outputs are spent using the old means.
564  Alternate cryptocurrencies / Altcoin Discussion / Re: Thoughts on a bitcoin tax to pay for development? on: August 07, 2020, 12:25:48 AM
If you want to fund development yourself, great!

If you ever see someone trying to change bitcoin's consensus rules to literally stuff money into their pockets,  I hope you reject their efforts with all due vigour.  That kind of funding proposal is extremely centralizing.

Scammers gonna scam.  The fact that scamming has been reliably profitable in this ecosystem is no reason for Bitcoin to duplicate it.
 
565  Bitcoin / Development & Technical Discussion / Re: Segwit Questions on: August 06, 2020, 10:40:06 AM
Quote
In fact, SegWit node will strip the witness data before sending the block to legagy node.

Interesting, so a SeqWit node sends out two versions of the Mined Block?  The stripped version for Legacy Nodes and the Extended Witness Data Block for Segwit nodes?

Thanks

If it's connected to an old non-segwit peer it'll send that peer a stripped block. All blocks it receives are the complete blocks, and of course any it sends to modern nodes are complete too.

There aren't that many pre-segwit nodes on the network anymore since segwit has been out for something very close to four years now. E.g. my node at home has 45 peers right now and every one of them is node_witness.

566  Bitcoin / Development & Technical Discussion / Re: Joining mempool RBF transactions on: August 06, 2020, 03:37:35 AM
Except "batch on replacement" is ludicrously hard to do.
That's why I say they should batch in the first place. Smiley

Quote
I actually think it's the hardest (pure) programming problem I've worked on, and don't feel like I'd even be able to do it given another 6 months. I've never done "logic programming" but I almost feel like something like that would be essential, where you sort of logically describe all the high level concepts and ask it to solve what you should do. As just trying to handle all the cases imperatively just seems impossible to not end up in an exploded spaghetti nightmare of a gazillion states.
[Bit off topic, just ranting here incase you have any insights]
That was all I had to offer. I think the right way to solve that isn't to write code for it, it's to write (or steal) a logic-relation engine.

In particular handling all the cases were an earlier partial payment confirms, and then making sure that your follwup payment conflicts with the earlier complete payments (either by being a child of the partial or more directly) ... just a gnarly mess.

For most people the best advise right now is batch in the first place.
567  Bitcoin / Development & Technical Discussion / Re: Joining mempool RBF transactions on: August 05, 2020, 10:05:28 PM
Without signature aggregation there wouldn't be much savings unless there was cut-through going on, but there isn't much of that naturally because wallets don't normally spend unconfirmed outputs by third parties.

It some cases senders have failed to batch and could batch on replacement, but the solution there is ... batching in the first place. Smiley
568  Bitcoin / Development & Technical Discussion / Re: Chain Archaeology revisited -- Any more known miners for sub 1000 blocks? on: August 05, 2020, 08:07:02 PM
This is a graph of bnExtraNonce not block.nNonce.  It gets incremented when blocks are found and when transactions arrive (which also causes common slope) but it is not reset when blocks are found. At difficulty 1 those shared causes of incrementing should be the primary driver of extranonce incrementing.
569  Bitcoin / Development & Technical Discussion / Re: Pollard's kangaroo ECDLP solver on: August 05, 2020, 02:07:11 PM
Thanks for the reading. I didn't read it yet.
I suppose that when you speak of walk length, you mean the total number of jumps of the walk, not the total traveled distance.
The problem of storing length of walk is that on GPU access to global memory is very slow. I will see if I manage to improve things.

Right.

This is specific to disk stored distinguished points stored for tame entries used to generically accelerate many different executions.

The idea is that sometimes distinguished points are closely spaced on a walk, and sometimes far apart. Given a constant amount of storage you would prefer to store widely spaced distinguished points over closely spaced ones.  You can't know the actual spacing, since you don't know what the walk looked like before your start-- but you could track how far you walked and store that.
570  Bitcoin / Mining support / Re: basic 220v question on: August 04, 2020, 10:13:55 PM
Your outlet is a NEMA 6-20.

I'm personally not a huge fan of NEMA 6-15/6-20, and prefer the locking kind... but that's what you've got, so you'll need to match your PDU up to that.

It's more common to find PDUs with L6-20 than 6-20 so you might need to get an adaptor or swap out the plug or outlet (it's pretty easy to swap out an outlet, assuming it was wired up correctly in the first place... turn off the breaker, unscrew it.. move the wires over...).
571  Bitcoin / Development & Technical Discussion / Re: Pollard's kangaroo ECDLP solver on: August 04, 2020, 06:30:57 PM
I haven't seen this paper discussed here: https://cr.yp.to/dlog/cuberoot-20120919.pdf

There are a number of good points in it but particularly the point of generating *better* distinguished points by preferentially keeping ones that have longer walk lengths is interesting.
572  Bitcoin / Development & Technical Discussion / Re: Taproot inside coinbase transaction? on: July 31, 2020, 02:06:22 AM
This doesn't really have anything to do with taproot.  Taproot isn't a way to have additional outputs on transactions, each taproot output is still just a single output.

Coinbase transactions can already have multiple outputs, and miners can collaborate to create blocks that pay each other directly rather than the the value going to one party.  P2Pool is an example of this, unfortunately it was undermined by Bitmain which produced mining hardware which wouldn't work with p2pool or anything like it.
573  Bitcoin / Legal / Re: Craig Steven Wright is a liar and a fraud - Tulip Trust addresses signed message on: July 26, 2020, 11:35:37 PM
Perhaps someone should make a franky1 free CSW thread.  I'm pretty sure everyone except franky1 would prefer it at this point, otherwise the conversation has just become totally boring and repetitive.
574  Bitcoin / Development & Technical Discussion / Re: Nothing is truly decentralized using a centralized ISP on: July 22, 2020, 05:32:15 PM
No security? The network is connected to the internet with NAT which goes through a gateway that has a VPN. Is that not security? There is no way to spy or track or identify a single user of the network. In addition you can also encrypt the wi-fi signal. Centralized ISP's are not secure. Centralized ISP's are the security breach themselves. The intelligence community gathers data through the centralized ISP's. They can now without any permission or warrant get your entire browsing history.  https://en.wikipedia.org/wiki/Network_address_translation

Lets imagine you have a place to VPN to that you trust and we ignore the fact that this destination is effectively a centralized ISP and that the logical party to operate a VPN endpoint for you is an intelligence agency.  Ok.   You can VPN to that place over a mesh or over a centralized ISP and then you get the same security and privacy properties as if you VPNed to it over some mesh.

You get the bonus property that any clown with a rpi cant totally shut down your network connectivity as they currently could with the mesh.
575  Bitcoin / Development & Technical Discussion / Re: Nothing is truly decentralized using a centralized ISP on: July 22, 2020, 03:30:29 AM
According to this one guy a group of PhD's had stated that B.A.T.M.A.N protocol is the best Mesh router protocol out there. B.A.T.M.A.N protocol is the one used by Freifunk,  which is Germanys mesh community and perhaps the largest in the world. What exactly do you mean with malicious mesh node? For what purpose would the malicious nodes exist? Standard nodes have max capacity and you could set a cap limit to output for standard nodes. Someone running a malicious node would forge the output to very high, right?

What B.A.T.M.A.N. does is has every participant periodically announce themselves, and then each peer that hears them repeats the announcement. Each node remembers the best source for a particular host they've heard of and sends traffic for it in that general direction.

The announcements have a hop count and a sequence number to prevent loops and repetitions of the announcements. 

There is absolutely no security at all, except by totally limiting access to the media (e.g. by encrypting all packets and not making the network accessible to the public).

If someone with access to the network wants to impersonate another party and receive almost all of their traffic all they have to do is start generating announcements for them.  They can selectively mitm, impersonate, or block access to any other party on the mesh.

If you are using some L3 IP security on top of the mesh (like a VPN) then they can't impersonate but they can trivially deny access.

So as they stand right now, these protocols do not work for public networks except to the extent that no one wants to bother attacking them.  A lot of the time that is probably true --- but centralized ISPs are also secure so long as no one wants to bother attacking.

It looks like the Freifunk firmware is still actively maintained-- https://github.com/ffbsee/ffbsee-firmware/commits/master   thanks-- thats the sort of thing I was looking for when I asked before.  There was a lot of excitement about meshes around 2013-2015 and there are a lot of dead webpages now.
576  Bitcoin / Development & Technical Discussion / Re: BIP numbering and status mess on: July 22, 2020, 02:39:15 AM
I can't figure out what, concretely, davef is asking for.

Would you prefer a spec which changes from time to time to falsely claim that it is final?  You would prefer that the spec not change even when demands mean the implementation must, so then the spec will just not match?   Or would you prefer the BIP have never been written in the first place, saving an epic boatload of time for the authors? Something else?


I don't intend to snark either, but your generalized complaint is totally opaque to me-- to the point that I can't even discuss it with you because I just can't tell what you expect.
577  Bitcoin / Development & Technical Discussion / Re: Pollard's kangaroo ECDLP solver on: July 21, 2020, 11:43:10 AM
Yes, I read the entire paper.


For  simplicity,  we  focus  on  the  attack against curves with j-invariant equal to 0 (i.e.,A= 0), but the attack also generalizes to the curves with non zero j-invariant. Indeed,  in  that  case,  the  faulty  curve  becomes  supersingular  according  to  Proposition  1,  and  hence  the  MOV  attack of  Proposition  2  applies


And they give attack costs about other curves. If an attacker can fault your computation, you're pretty screwed regardless of what curve you use unless countermeasures are implemented. I bet in a lot of implementations a well timed fault can cause them to just print the secret key.

Fault attacks remain completely irrelevant to this thread.
578  Bitcoin / Development & Technical Discussion / Re: Pollard's kangaroo ECDLP solver on: July 21, 2020, 10:10:39 AM
Jean_Luc,

Could be of interest to you:

https://github.com/bitcoin-core/secp256k1/pull/767

Degenerate Fault Attacks on Elliptic Curve
Parameters in OpenSSL
https://eprint.iacr.org/2019/400.pdf

Not applicable to this thread. It's about fault attacks, where you cause a glitch in a cpu while signing to make it miscompute and leak a key. They demonstrate a particular form of this against several curves.

I don't think their countermeasure advice is all that great.  Sure, storing G as x/y is cheap and stops this particular approach (except in ecdh) so everyone should do that and effectively everything does, but if an attacker can cause skipped instructions there probably are a bunch of other ways to attack.  Better to verify after signing, like bitcoin core does.
579  Bitcoin / Development & Technical Discussion / Re: Need a load of testnet bitcoins for my project! on: July 18, 2020, 11:46:38 PM
The question is what do they need all these testnet coins for?
It's true, they are getting it for free in exchange of their shitty token but is it really worth all the hassle?
Can it be used to perform an attack against the testnet network?

Maybe they are just planning to sell it for developers after draining all other resources.

Unfortunately people can disrupt stuff at no direct gain to themselves.

It's like, you want to give away shitty ICO tokens. You want them mostly to go to your own people, but you also want to allow a bit of the public to participate in order to build a base of invested promoters and also as air cover to hide and justify your self-issuance.

So you tell people they can have some free coins if they send you a video of them smashing a happy-meal toy.

Someone might ask how the issuers benefit from smashing toys? Are they planning on cornering the toy market? No: They don't benefit-- it was just a limited supply thing that they could get an early jump on because they set the rules.  And now all the later participants will be invested because they did work to get the 'free' tokens.

The fact that it creates an external harm such as depriving toy collectors of accesses to toys-- or in our case making it hard to get testnet coins for actual testing-- is irrelevant to the people making these decisions.

One of the reasons that externalities are often hated in public policy is that they're often extremely asymmetric: You save $10 disposing of toxic waste by dumping it and create pollution that will cost someone else $1 million to remedy.

If people working on Bitcoin can't easily get testnet coins in the future after this they'll just switch to a new testnet.  For now, there is regtest which is better than testnet for most applications so it isn't super urgent.

The bigger harm from this is just the annoyance of people showing up everywhere begging for testnet coins and the negative feelings created in donors and faucet operators that their charity was exploited so someone could make a quick buck.


Kind of an interesting thought but, should we just start reporting all the threads people are posting begging for tBTC the same way we report regular begging for coins?
Yeah, report any testnet begging that doesn't have a clear description that convinces you that it isn't just someone trying to get them for profit purposes. Like if someone says, "hey, trying to test [link to their program] and could use 0.001 TBTC and some users to try it out with me" then sure, that's not a problem, and you don't need to report it... though if it sounds like they don't know about regtest, it may be useful to tell them about it.
580  Bitcoin / Development & Technical Discussion / Re: Nothing is truly decentralized using a centralized ISP on: July 18, 2020, 09:27:21 PM
The thing with Mesh is that the more nodes are interconnected, the faster the internet will become. This is easier to accomplish in a large city. Also with Mesh you are never queued because it always chooses the optimal available node for connection.
What you're describing is currently only true in the land of spherical cows.

The reality of mesh technology is that it's extremely challenging and as a result underdeveloped.

E.g. up thread I asked for examples, and the primary example is a lora mesh that achieves extremely low bandwidth SMS like messaging.

It's really cool, but it's not "fast internet".

No one has even really started to answer questions like how you can handle malicious mesh nodes in a way that doesn't compromise performance or just require all nodes to be approved.

Right, so you are Mesh expert and you have examined all the projects and you know this for sure? No wonder Bitcoin is slow if uses a satellite as third party in its centralized pyramid scheme.
I've certainly been a networking expert (e.g. my CV would support that claim).  I'd be totally happy to see mesh projects that delivered the properties that you're claiming, but I haven't seen them.  Please -- feel free to find examples. I'd be happy to discuss them.

You're not making a case for your own expertise by calling satellite slow. For a natural broadcast usage like Bitcoin it can be exceptionally efficient.  For example, the cumulative directtv video bandwidth is multiple gigabit/s per second--  available to every location over entire entire landmasses with costs like femto-cents-per-megabyte-per-potential-user.  No other technology is even comparable for broadcast use.   It doesn't do all things well, but it's still a very powerful technology.
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 [29] 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 ... 288 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!