Bitcoin Forum
May 27, 2024, 10:07:00 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 ... 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 [311] 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 ... 421 »
6201  Other / Meta / Re: Ponzi Sub-Forum????????? on: August 26, 2011, 02:00:02 AM
There were indeed way too many Bitcoinduit topics. I have locked many of them. When things get out of hand like this and reports aren't getting results, PM me.

Ignoring those, it seems to be mostly non-Ponzi gambling still.
6202  Bitcoin / Development & Technical Discussion / Re: Proposal : standard transactions for security/backup/escrow on: August 24, 2011, 06:06:40 PM
Phew.  Ok, I feel better; consensus seems to be that enabling some or all of the proposed 'new standard' transactions is a good idea.

All the rest (new address format?  send to old addresses and immediately resend?  etc etc etc) can be argued to death later.


Please also enable the non-address versions. Like:
2 KeyA KeyB 2 OP_CHECKMULTISIG
1 KeyNormal KeyBackup 2 OP_CHECKMULTISIG
2 KeyA KeyB 2 OP_CHECKMULTISIG OP_DUP OP_NOTIF KeyBackup OP_CHECKSIG OP_ENDIF
6203  Bitcoin / Development & Technical Discussion / Re: Modify OP_CHECKSIG on: August 24, 2011, 03:36:39 AM
I was thinking recently that it might be a good idea to write the code for all of the proposed (and agreed-upon) changes to Bitcoin's core structure and put them in place, but keep them disabled until a transaction version increase is forced by some critical bugfix.

An enhanced version of OP_CHECKSIG could also specify which hash algorithm is used for hashing the transaction before signing.
6204  Bitcoin / Development & Technical Discussion / Re: Proposal : standard transactions for security/backup/escrow on: August 24, 2011, 12:29:03 AM
I don't think it's reasonable to put the burden on the sender (in the general case, at least). The large addresses will be annoying to work with, and fees will be higher due to larger data sizes. There may even be programs made to transform "expensive" addresses into "cheap" addresses by changing the version and removing all but one address.

The recipient should receive on a normal address and then resend to himself with the odd transactions. Then the recipient pays the extra fees, and no one will have to deal with huge addresses. There will be a short period of time when the funds are unprotected, but I don't think this will usually be a problem, and it's worth the benefits.
6205  Bitcoin / Development & Technical Discussion / Re: Proposal : standard transactions for security/backup/escrow on: August 23, 2011, 11:50:24 PM
I don't see why it's necessary to support addresses for backup and secure-device transactions. Bitcoin can remember the public keys before they are exported to the backup or device.

With an additional device:
Code:
2 KeyA KeyB 2 OP_CHECKMULTISIG
KeyA is a local key known by Bitcoin. KeyB is probably remembered from previous use; if not, it can be transferred in a QR code without much trouble (~90 base64 characters is fine).

With a backup:
Code:
1 KeyNormal KeyBackup 2 OP_CHECKMULTISIG
KeyBackup is static, remembered by Bitcoin. KeyNormal is a local key.
6206  Other / Meta / Re: Get Donator status by donating 10 BTC on: August 23, 2011, 11:18:02 PM
i'd donate ten coins(when i get ten) if it meant a skype address on our profiles

Done.
6207  Other / Meta / Re: Get Donator status by donating 10 BTC on: August 23, 2011, 07:59:30 PM
I'll resend donated funds to the main address so you can see the proper received amount. (As always, note that balances and sent BTC amounts will not be correct.)
6208  Bitcoin / Development & Technical Discussion / Re: OP_CHECKMULTISIG - how does it work? on: August 23, 2011, 06:57:13 PM
If ScriptPubKey says:
Code:
2 KeyA KeyB KeyC 3 OP_CHECKMULTISIG
Then ScriptSig must provide signatures for exactly two of A-C, listed in order.

If ScriptPubKey says:
Code:
1 KeyA KeyB KeyC 3 OP_CHECKMULTISIG
Then ScriptSig must only provide one of A-C.

It's not sane to allow the scriptSig to provide the sig count, since it would be legal for them to set it to 0.
6209  Other / Meta / Re: Get Donator status by donating 10 BTC on: August 23, 2011, 06:31:49 PM
Has anyone donated 10btc yet?

Thanks to the first 10-BTC donator: Narydu.
6210  Bitcoin / Development & Technical Discussion / Re: Anyone else concerned about global hashrate? on: August 23, 2011, 06:33:45 AM
You're talking about the developers intentionally revoking previously-valid transactions by central fiat - and they can't just revoke the ones involved in the double-spend, they have to revoke all of them.

It's not fiat because, as you mentioned, people can choose to accept or reject the changes.

It will be easy to see which transactions came first, since the blocks containing those transactions were broadcast and then later "replaced". There may be problems with innocent people losing confirmed transactions that were based on double-spent coins, but hopefully the problem can be dealt with before this happens much.

The client should probably require 120+ confirmations for transactions that seem to be double-spends, since these transactions could be reversed later on. Maybe if this kind of attack becomes an issue, a peer warning system for double-spent transactions could be developed to trigger this protection.

Bitcoin could also enter safe mode automatically whenever a reorg longer than 6 blocks is observed, or when smaller reorgs happen too many times within some time period.

Quote
If any exchange or e-wallet site remains running after the double-spend attack - and not all of them can afford to watch the news 24/7 - they risk having their wallets drained by double-spends assisted by the Bitcoin developers themselves!

Their wallets will be drained in any case. The hardcoded changes might return some of the coins.
6211  Other / Meta / Re: Thread about Eligius putting prayers in bitcoin chain on: August 22, 2011, 04:44:48 PM
FUD does? If anything, if there's a problem of only some FUD being removed, I'd think the solution would be to remove more FUD, not to restore the FUD that was removed. Or at least make a forum for moving FUD to (which is not merely "off-topic")

It's an interesting use of the block chain. This is actually one of the only five topics I'm receiving notifications for...
6212  Other / Meta / Re: Thread about Eligius putting prayers in bitcoin chain on: August 22, 2011, 04:36:47 PM
I think it deserves a place somewhere on the forum, so I've restored it to off-topic.
6213  Other / Meta / Re: Thread about Eligius putting prayers in bitcoin chain on: August 22, 2011, 02:30:55 PM
DiabloD3 deleted it.
6214  Bitcoin / Development & Technical Discussion / Communication during an emergency on: August 22, 2011, 12:52:04 PM
Any serious attacker is going to take down this forum, Freenode, and any other IRC network we use while he attacks Bitcoin. This will seriously disrupt efforts to fix the problem.

For example, if #bitcoin-dev and the forum had not been available during the overflow incident, lfm (IIRC) would have had to report the bug directly to someone via email. Maybe he would have waited hours/days to do this. There was also rapid-fire collaboration on #bitcoin-dev to create a fix and spread the word.

Some alternative to #bitcoin-dev needs to be prepared for emergencies like the overflow incident, when #bitcoin-dev might not be available. IRC-like real-time communication would be ideal, as it allows quick collaboration.

Initially I was thinking that in case of a Freenode outage, we could get several people to temporarily donate servers to the LFnet IRC network and relocate there. However, laszlo has told me that IRC is inherently weak to denial of service attacks and is unsuitable.

Other methods:
- This forum could certainly be taken down easily, so it is not suitable.
- I'm not sure how easy the mailing list is to take down. My guess is that flooding would kill it pretty easily. Maybe an invite-only or moderated list would be more resilient. If Bitcoin gets very big, it might become economical for the attacker to take down or corrupt SourceForge.
- I think Usenet is pretty resilient, but can groups be easily flooded into oblivion?
- Freenet would work nicely, but it's too difficult to use. Requiring it would prevent most people from joining the discussion. (I don't even run it any more, since it takes up too many resources.)
- Tor/I2P hidden services are worse than non-anonymized centralized services for DoS-resistance.

Are there any alternatives to IRC that can withstand powerful DDoS attacks and spamming?
6215  Bitcoin / Development & Technical Discussion / Re: Anyone else concerned about global hashrate? on: August 22, 2011, 08:44:17 AM
First, have you seen how freakin' difficult it is to get users to upgrade their clients?

It won't be difficult when an alert is issued and everyone's clients are saying "EMERGENCY: DO NOT ACCEPT TRANSACTIONS UNTIL YOU HAVE UPGRADED".

Quote
Second, if it happens once, what's to stop the same person from doing it again?

There are various techniques that can force the attacker to get larger percentages of computational power before getting control. These would be developed if necessary. We'd also get better at handling alerts (probably alert-enabled safe mode would be re-introduced) and detecting attacks automatically.

Legitimate miners would have an excuse to charge higher fees, which would allow them to get more hardware.

The attacker will run out of money eventually. It'll never be profitable.

Quote
Third, you can't possibly believe that such an event would not make headlines and cause catastrophic damage to the BTC network...?

I don't really care about the price. The network will survive, which is what counts.
6216  Bitcoin / Development & Technical Discussion / Re: Anyone else concerned about global hashrate? on: August 22, 2011, 05:39:26 AM
If someone tries that, an alert will be issued and payments will stop for as long as the botnet owner is willing to waste money. Once the botnet gives up, any damage they've caused will be reversed by hardcoding correct values into the client. Only a few people will end up losing money, and the botnet owner will be worse off than if they had stuck with normal botnet activities or legitimate mining.
6217  Other / Meta / Re: bitcointalk.org SO SLOW on: August 22, 2011, 03:27:06 AM
There is a backup once per day, which basically takes down the forum for 5-10 minutes. I've never actually been on the forum while this was running on its own, though: I've only seen it when I've manually created the backup.

There's also an update of membergroups every 10 minutes that slows things down for a few seconds.
6218  Other / Off-topic / Re: A message from the president of USA, from the future on: August 21, 2011, 09:33:06 AM
He'll say, "Hey Ben, print me up some more money."
6219  Other / Meta / Re: Get Donator status by donating 10 BTC on: August 21, 2011, 03:24:49 AM
Are colored names, for moderators and donors, a possibility? Not just in the "who's online", but on the side too?

I think that would be annoying.
6220  Other / Meta / Re: Português (Portuguese) Forum - Child Boards on: August 21, 2011, 12:15:59 AM
Start a topic about it in the Portuguese section. Because I can't read Portuguese, I can't decide whether a subsection is necessary.
Pages: « 1 ... 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 [311] 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 ... 421 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!