Bitcoin Forum
April 30, 2024, 12:44:20 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 ... 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 [109] 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 ... 288 »
2161  Alternate cryptocurrencies / Altcoin Discussion / Re: New/Custom RPC calls on: January 01, 2015, 03:36:51 AM
I need help creating new RPC call list  that can give me the following information or if you know how to change/add a few lines that will provide the following results. (explicitly)

1) count of all incoming wallet tx - then all incoing wallet tx by account
2) count of all outgoing wallet tx  - then all outgoing tx by account
3) count of transactions to a specific address
5) total value of all incoming wallet tx
6) total of all outgoing wallet tx
7) count of mined blocks by this specific wallet
10) date of each accounts first tx
**note  i know of the existing call list and listtransactions, however it does not explicitly give these results.
As you note, these are indirectly accomplished via listtransactions already. It's not going to be faster to generate them directly as it will take the same process as a listtransaction to handle them internally.

Since you need help to do so, perhaps adding RPCs aren't the best way to handle your needs.

Keep in mind that errors made while programming here may cause funds loss. The threshold for where you need to add something new should be accordingly somewhat high.

Quote
4) count of transactions from a specific address
Bitcoin transactions do not have from addresses. https://iwilcox.me.uk/2014/no-from-address

Quote
8 )  total transactions in the entire blockchain
This data is in chainActive.Tip()->nChainTx

Quote
I have re-introduced IRC in my version of the wallet and wish to use it to automatically send payment requests (URIs), if anyone can help with that too  Smiley
IRC is a pretty crappy way to have a centralized server handle things... it's crappy because the server has few tools for DOS mitigation, because messages are very limited in size, and because it's frequently blocked.

If you're willing to trust a server to mediate communications, there are better options. Though, I won't if you really are willing... what happens when that IRC server replaces addresses in payment URIs?

Quote
Assistance is most appreciated.
You haven't actually asked a question. By assistance do you mean "I'd like someone to do the work for me, for free, and I'm not even going to tell you why"?  Thats what it sounds like, absent an actual specific question. If that isn't the impression you want to give you should try making it clear that you've attempted this stuff yourself already and ask specific questions.
2162  Alternate cryptocurrencies / Altcoin Discussion / Re: 1 wallet 1 account on: January 01, 2015, 02:42:50 AM
Is this in response to my question? And did you read my reasons for wanting it that way?
I did, but it doesn't follow. One does not need to use a constant address to have transparency. (As an aside, your goal has extreme scaling problems if implemented directly; part of the reason to have exchanges in the first place is to support high volume instantaneous transactions.)
2163  Alternate cryptocurrencies / Altcoin Discussion / Re: 1 wallet 1 account on: January 01, 2015, 02:34:06 AM
This is not good for security and it's also bad for not just your privacy but the privacy of everyone you transact with (and, ultimately) for all of Bitcoin. It also creates increased systemic risk for the system as parties that reuse addresses are trivially blockable and if many users are behaving in ways that can be blocked miners may be pressured to utilize their position in ordering transaction to block particular participants in the system, the same also applies to other services such as exchanges: if you behave in a identifiable way otherwise honest participants may be forced to block or seize your funds when they can.

Forcing a single address also generally incompatible with normal business practises. A Bitcoin address is emphatically not an "account"-- it's more like a serial number of a bill, alternatively it would be more accurate to think of it as an invoice number. Normal bitcoin usage requires you to use addresses to distinguish which of multiple payers has paid you.

For these reasons this behaviour is not generally supported by Bitcoin core and I question the level of understanding of the system of anyone who produces software which works in this manner.
2164  Bitcoin / Development & Technical Discussion / Re: could you be Satoshi - #1 did you learn about hashcash before bitcoin? on: December 29, 2014, 10:50:08 AM
Thats the point Adam is making. "Anyway I claim the hard part about bitcoin is the decentralised secure inflation control (and sybil resistant byzantine generals solution.) "
2165  Bitcoin / Development & Technical Discussion / Re: Can block rewards be sent to a multisig address? on: December 28, 2014, 07:29:23 AM
If you include a multisig transaction in your block, can you have the block reward go to that address?
Sure. Any scriptPubKey works... in that respect its no different from any other transaction.
2166  Bitcoin / Development & Technical Discussion / Re: Smart Contracts and Transaction Malleability on: December 28, 2014, 12:57:11 AM
"Counterparty" cannot actually implement a smart contract system for Bitcoin. It can only do so for its own altcoins, and only at the expense of being incompatible with SPV and being subject to blocking by miners (who might suffer loss of value of their bitcoin income should the counterparty altcoin manage to displace bitcoin to any great extent).
2167  Bitcoin / Development & Technical Discussion / Re: When are Sidechains going Live? And the Fork ... ? on: December 27, 2014, 04:39:25 PM
Well I'm not sure what you're expecting: releases are planned; and proceeding more or less on schedule: http://sourceforge.net/p/bitcoin/mailman/message/32971508/

Some features have had to slip here and there, mostly due to a lack of testing interest from the community; e.g. http://www.reddit.com/r/Bitcoin/comments/2krlob/wladimir_tweets_call_for_testing_and_review_help/

Please don't confuse Bitcoin with a product that is owned by someone who can just set out and tell you how you're going to be able to use Bitcoin in the future. Bitcoin's future is defined by what people make of it; not some schedule anyone imposes on it top down.
2168  Bitcoin / Development & Technical Discussion / Re: When are Sidechains going Live? And the Fork ... ? on: December 27, 2014, 04:27:51 PM
I haven't insulted anyone.  Dev team members have publicly stated that there has been a lack of progress, direction, and organization partially in part due to ongoing arguing, and other issues.  I am not insulting.  I am quoting.
No they haven't.

Mike Hearn has made some comments like that, but he's not a member of the development team of Bitcoin core, and I believe everyone who is actually involved in the development was more or less mystified by his comments. I certainly was. They certainly don't reflect the actual enormous amount of ongoing activity.

Quote
But its important for the community to know that this thing they hope for isn't even slated for development or release
Thanks for making the agenda in your post clear, I guess Smiley  But it's not so, things are actively being developed, but the design we came up with was one where much of the development could happen without any additions to Bitcoin at all (via the federated peg, described in the appendix of the sidechains whitepaper). It would be improper to take things out of order and suggest softforking additions to Bitcoin without making the use-case for it.
2169  Bitcoin / Development & Technical Discussion / Re: When are Sidechains going Live? And the Fork ... ? on: December 27, 2014, 07:44:12 AM
No fork is currently proposed.

Quote
Frustrating having a decentralized system when there's nobody managing timelines, milestones, and delivery dates.....
Plenty of people are. but you choose to ignore and insult the people working on the project, for which you don't pay... don't expect them to go out of their way to draw your attention to it.
2170  Bitcoin / Development & Technical Discussion / Re: Funding network security in the future on: December 26, 2014, 03:55:54 PM
The "right" chain is the chain that is supported by the exchange that is willing to swap your coins for other things of value.
Seems to have worked out great for all those buying into MTGOX's view of the world.
2171  Bitcoin / Development & Technical Discussion / Re: deleting old blocks to save space on: December 25, 2014, 11:43:10 AM
Making it potentially infeasible or much more costly to introduce new nodes to the network would undermine security enormously, it's critical that this not be undermined. In any case, we've been working on this for _years_ uninformed navel gazing on bct isn't going to move it along.

None of you showed up to test the patch when we made a public call in the hopes of having an initial version in 0.10. Perhaps in the next version.
2172  Bitcoin / Development & Technical Discussion / Re: Thoughts on type safety and crypto RNGs on: December 25, 2014, 10:26:13 AM
Yes, that "safe" subset of C++ is emulating a simple and restricted reference counting runtime by hand. Certainly doable.
That isn't the case. Yes, reference counting is one tool, in that box but it has considerable costs. Most things are handled by RAII. And then there is unique_ptr... "By hand" is also perhaps misleading... in that, for better or worse, the developer themselves doesn't see the machinery under the hood any more than they see boundary checking in Java.
2173  Bitcoin / Development & Technical Discussion / Re: [AUDIT] The Bitcoin Source Code Check! on: December 25, 2014, 09:12:03 AM
Now I plan to audit the source code of the client bitcoin. Offer a community to support me in this matter. My intention is focused on the idea Satoshi Nakamoto: I'm for freedom!
There are hundreds of contributors who have been auditing it for years as part of their use (and, in some cases, efforts to enhance it)-- the difference is that they went in and did it, they didn't step up here and ask for money before even showing that they had the skills to contribute useful review.
2174  Bitcoin / Development & Technical Discussion / Re: Thoughts on type safety and crypto RNGs on: December 24, 2014, 08:23:37 PM
I'm mainly concerned about whether or not using C(++) with manual memory management is acceptable practice. Screwing up manual memory management exposes you to the king of all implicit details: what garbage happens to be in memory at that very moment.
We mostly do not use manual memory management in Bitcoin core. Virtually all use of delete is in explicit destructors, most things are just RAII. I looked a while back and think found only something like three or four instances of use delete outside of destructors, and I assume those cases will all be changed the next time they're touched (e.g. examples include the wallet encryption, which hasn't been touched in years).

(I thought it was really weird of Mike brought up manual memory management, I see I made an error in not correcting him.
2175  Bitcoin / Development & Technical Discussion / Re: deleting old blocks to save space on: December 24, 2014, 08:18:03 PM
It is not quite so simple. You'll abuse your peers if you make them think you can serve them blocks but fail. If you erase too much you'll be unable to reorganize.   We plan on actually supporting this, in a sane organized manner probably in the next major version. (The fact that you were able to try that at all is a result of our work to facilitate that feature, prior to 0.8 there was no data you could just delete without making yourself unable to verify new blocks.)
2176  Bitcoin / Development & Technical Discussion / Re: Thoughts on type safety and crypto RNGs on: December 24, 2014, 01:50:07 AM
So I'm certainly not disagreeing with these points; but I am disagreeing with the magic bullet thinking which is provably untrue: Writing in FooLang will absolutely not make your programs safe for people to use. It _may_ be helpful, indeed, but it is neither necessary nor sufficient, as demonstrated by the software deployed in the field.

Neither Mike nor myself advertized a language as a magic bullet that makes programs safe.

You however seem to belive in superior powers of maintainer that outweighs advances of languages and runtime enviroments of the last decades.

I'd say you play a more dangerous game than us.

You wrote, "Most exploits arise from programming errors in low level weakly typed languages". I pointed out that in our space we've observed the opposite: There have been more serious cryptographic weaknesses in software written in very high level languages like python, javascript, php, Java. etc. Thats all.  Please tone down the personal insults. You're very close to earning an ignore button press from me. I have scrupulously avoided besmirching your skills-- or even saying that I think your preferred tools are not _good_, only that that people using them suffer errors too-- but in every response you make you attack my competence.
2177  Alternate cryptocurrencies / Altcoin Discussion / Re: SPV for namecoin names..?? on: December 24, 2014, 01:43:51 AM
Is this possible?  I know SPV works by proving the tx through giving you the hashes to reconstruct the Merkle Tree, which means it can prove a tx is in a block, which isn't good enough for namecoin names, since proving a name doesn't prove that a new update hasn't happened.  I'm trying to figure out if there's a "lite client" way to prove a current name, and before I spent days thinking on it, I wanted to make sure the problem hadn't already been solved.  Has somebody figured this out yet?
Yes, years ago. https://bitcointalk.org/index.php?topic=21995.0
2178  Bitcoin / Development & Technical Discussion / Re: Thoughts on type safety and crypto RNGs on: December 22, 2014, 08:09:22 PM
I've made some suggestions on how to do this in the past (auto restart on crash, use Boehm GC)
Our process is not "don't make mistakes", Bitcoin Core largely uses a safer subset of C++ that structurally prevents certain kinds of errors (assuming the subset is followed, we don't have any mechanical enforcement).  I don't believe anyone writing or reviewing code for the project would describe things primary safety strategy as coming from "don't make mistakes", not with the level of review and the general avoidance of riskier techniques.

Though even equip with automatic theorem provers that could reason about cryptographic constructs no language or language facility can free you from having to avoid errors (though avoiding errors is much more than "just don't make them").

Things like "restart on crash" can be quite dangerous, because they let an attacker try their attack over and over, or keep the software running (and mining / authoring irreversible transactions) on a failing system. In most cases if we know that something that the software hasn't accounted for has happened just being shut down is better. If doing this results in a DOS attack, ... DOS attacks against the network are bad, but they're preferable to less recoverable outcomes. I think if anything we'd be likely to go the other way: On a "can never happen" indication of  corruption, write out a "your_system_appears_busted_and_bitcoin_wont_run_until_you_test_it_and_remove_th is_file.txt" that gets checked for at startup.

Quote
WRT RNG issues in Java
There have been Java bitcoin software, e.g. a vanity-generator that generated predictable keys, altcoin software that failed in various ways, bouncycastle causing inconsistency in node software from throwing surprise null pointer exceptions on weird inputs. I wasn't saying that there was any language issue there, but pointing out that even using the most confined language you can find will not prevent people from writing unsound cryptographic software. (And perhaps even making things worse, if the protection against idiotic mistakes makes people forget that they're playing with fire.)

You're also conflating two separate problems. It may turn out that writing consensus-critical code in other languages is harder, but that's a very different problem than writing secure code in the more general sense.
Actually no, you're catching the point I'm making but missing it.  Cryptographic systems in general have the property that you live or die based on implicit details. Cryptographic consensus makes the matter worse only in that a larger class of surprises which turn out to be fatal security vulnerabilities. It's quite possible, and has been observed in practise, to go end up with exploitable systems because some burred/abstracted behaviour is different than you expected. A common example is propagating errors up to to the far side when authentication fails and leaking data about the failure allowing incrementally recovering secret data.  Other examples are that implicit padding behaviour leaking information about keys (there is an example of this in Bitcoin core: OpenSSL's symmetric crypto routines had implicit padding behaviour that make the wallet encryption faster to crack than had been intended.)

I'm certainly a fan of smarter tools that make software safer (I'm conceptually a big fan of Rust, for example). But what I'm seeing deployed out in the wider world is that more actual deployed weak cryptography software is resulting from reasons unrelated to language.  This doesn't necessarily mean anything about non-cryptographic software. And some of it is probably just an attitude correlation; you don't get far in C if you're not willing to pay attention to details. So we might expect other languages to be denser in sloppy approaches. But that doesn't suggest that someone equally attentive might not do better, generally, in something with better properties. (I guess this is basically your demographic correlation).  So I'm certainly not disagreeing with these points; but I am disagreeing with the magic bullet thinking which is provably untrue: Writing in FooLang will absolutely not make your programs safe for people to use. It _may_ be helpful, indeed, but it is neither necessary nor sufficient, as demonstrated by the software deployed in the field.
2179  Bitcoin / Development & Technical Discussion / Re: Can we decide on RFC 6979 or an equilvalent before we have more issues? on: December 21, 2014, 08:13:40 PM
But I was wrong, they actually provide a way to check that the firmware isn't tampered - even if it is by them.
Tampered firmware can just feed you a copy of the correct firmware. Sad  (snake oil certification even gets the clueful folks, I guess).

The btcchip stuff apparently works with multisig... though it's a little odd to use because it doesn't have a display (it does a very clever thing where it acts as a USB HID device and you plug into another device to act as the screen.)
2180  Bitcoin / Development & Technical Discussion / Re: Thoughts on type safety and crypto RNGs on: December 21, 2014, 08:10:06 PM
BTW what about the heartbleed bug in SSL was it not in Bitcoin core?
It was an issue in OpenSSL (bitcoind doesn't expose SSL to the public in a default, or even sane, configuration at least).  Every other language also depends on system libraries too. So the language Bitcoin core was written in was irrelevant in this example.

Quote
Unfortunatelly you only use your intelligence to pinpoint inaccuracy in my sentences.
I'm sorry you feel that I'm nitpicking, but I'm not trying to.

So far our experience in this space is that there is more irresponsible and broken software written in higher level languages, there has been virtually no issues in this space from cryptographic weaknesses (or even conventional software security) in Bitcoin applications written in C / C++. I agree that sounds somewhat paradoxical... but it's not that shocking: The security of these systems depends on the finest details of the behaviour of each part of the software and the interactions, when your system obscures the details some extra work is required to review though the indirection. This somewhat offsets the gains. In cryptographic (and especially consensus) systems it's much harder to "fail safe" and a much wider spectrum of unexpected behaviour is actually bad and exploitable. Languages like Java make some kinds of errored software "more safe" when the software is incorret, but making software more correct is still something that is largely not reaching production industrial software development yet (languages with dependant types and facilities for formal analysis seem like they _may_ result in more correct software).  

There is no replacement for hard work and many view higher level languages as an escape from drudgery, so there may be some language selection bias from the attitude of the authors that has nothing to do with the language itself.  In any case, I think your barb was misplaced, at least in this thread: We've seen bad RNG behaviour from Java software several times, and not just in system libraries. (And not just RNG safety, also things like attempts at full node code being shattered by underlying crypto libraries bubbling up null pointer exceptions that cause false block rejections which would have created forks if it were widely used).

(I do agree though that using untyped languages is basically suicide for any, even moderately large, system where correctness matters.)
Pages: « 1 ... 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 [109] 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 ... 288 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!