Bitcoin Forum
April 30, 2024, 01:47:35 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 ... 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 [128] 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 ... 288 »
2541  Bitcoin / Development & Technical Discussion / Re: Alternatives to blockchain technology on: July 01, 2014, 02:00:01 AM
Am I wrong?
Yes, you are wrong— if all you are doing is verifying new blocks and not initializing new peers there is no reason to store the historical data, you need only store the list of currently spendable coins (this owing to the fact that the bitcoin system tracks atomic coins, and not 'balances'.). This is what section 7 is about, and I thought it was rather clear— so you're going to have to ask some questions if there is to be any hope of someone figuring out where your misunderstanding is coming from.

Certainly you're not likely to get far by insulting the people who you'd hope to educate you about the matters you're asking about.
2542  Bitcoin / Development & Technical Discussion / Re: I assume this 497 BTC output is unspendable? on: July 01, 2014, 01:40:25 AM
It's a slippery slope, perhaps— "don't @#$@ with the behavior" is a clear position... but not really viable with the current state of the art in software engineering— otherwise bitcoin would have been dead with the integer overflow bug back in 2010.  I think the next reasonable compromise is "don't @#$@ with the behavior unless ~everyone agrees".  Sometimes its hard to tell what everyone would agree with, however.  Fixing obvious software bugs in the system itself seems to have gone without issue so far.
2543  Bitcoin / Development & Technical Discussion / Re: I assume this 497 BTC output is unspendable? on: July 01, 2014, 01:24:27 AM
Well MtGox wasn't the only one to do it.  2609.36304319 BTC over the years due to this single malformed template isn't a small chunk of change.  It just struck me as strange as these 23 outputs represents the majority of the "custom" scripts in the UTXO and they all are the same exact mistake.
They were all within a couple hours of each other AFAIK and all by MTGOX.  Am I incorrect?
2544  Bitcoin / Development & Technical Discussion / Re: Alternatives to blockchain technology on: July 01, 2014, 01:04:26 AM
this doesn't change the fact that each and every satoshi has a history stored in each and every working node.
I see you've still not read section 7.
2545  Bitcoin / Development & Technical Discussion / Re: I assume this 497 BTC output is unspendable? on: June 30, 2014, 11:45:09 PM
This was MTGOX it made a bit of news back when it happened.

Like most epic failures it took a complex series of events to happen— that transaction was non-standard and wouldn't have been mined by normal nodes... but mtgox had an API to ask eligius to mine transactions of interest to it which bypassed all non-standardness checks and their system flagged those transactions for prioritization.

I'm sort of surprised that no one has even proposed a hardfork to recover those coins— esp. in light of mtgox somehow losing most of their customer's coins. Smiley
2546  Bitcoin / Development & Technical Discussion / Re: Alternatives to blockchain technology on: June 30, 2014, 10:51:12 PM
One of those handicaps is the blockchain size. Blockchain has to include each and every transactions made in the network
...
All existing wallets having a positive balance and their holdings may be stored, for example, instead of storing all transactions. Is something like that or something other than that doable?
It sounds like you haven't read the original bitcoin whitepaper? See section 7.
2547  Bitcoin / Development & Technical Discussion / Re: NSA and ECC on: June 30, 2014, 12:54:06 AM
secp256k1 is "somewhat rigid" not "fully rigid":
Incorrect. The parameters _are_ minimal, there is a script to reproduce them from first principles _in this very thread_.

Quote
Given that efficiency claims have been arbitrary.
There is nothing arbitrary about it, with use of the efficient endomorphism enabled libsecp256k1 is (AFAIK) the fastest implementation of ECDSA verification on general purpose hardware in existence, obviously if it contained an implementation of schnorr signatures over this group they'd be even faster due to being able to skip the modular inversion too, but as far as I know it is unparalleled by any other actual ECDSA implementation with comparable security...

Nor are there any obviously strictly superior alternatives, _even today_ much less several years ago, the best contenders have a cofactor greater than one— allowing a non-prime group at a minimum costs several bits of security (e.g. equal or worse to the rho improvement from the efficient endomorphism), and depend on implementation hacks that require private keys to be in a particular sub-group, making things like multiparty key derivation (e.g. BIP32) incompatible with those implementations.
2548  Bitcoin / Mining support / Re: Essentially Gambling your hashes away on: June 29, 2014, 03:08:36 AM
You can mine on P2Pool and turn your share difficulty way up— there is a maximum, but it's pretty high. Or you can solo mine.
2549  Bitcoin / Development & Technical Discussion / Re: Algorithm for elliptic curve point compression on: June 28, 2014, 10:54:27 PM
This makes me more confident that there's "nothing up my sleeve" than 2^256 - 2^32 - 977 or 2^256 - 2^32 - 2^9 - 2^8 - 2^7 - 2^6 - 2^4 - 1. Thanks!
Yep.

There was another thread in this subform where we showed that all of the secp256k1 parameters can be deterministically derived from reasonable first principles— even ones simpler than the ones we know where actually used (e.g. you don't have to require that the curve have the efficient endomorphism, a practical increment from zero search still finds ours first), except for the generator point— whos value is irrelevant for security assumptions except in somewhat contrived situations (basically if someone from cetricom or the NSA shows up and tries to convince you that they don't know the discrete log of to_point(H(pi)) on our curve, you might not want to believe them because G could have been selected in such a way as to make the discrete log of a chosen in advance but seemingly nothing up my sleeve point known).
2550  Bitcoin / Development & Technical Discussion / Re: Proof of reserves on: June 28, 2014, 10:47:47 PM
Now prove you are suppose to have "X" BTC.  To be truly proven you must also prove the site has the right amount.
https://iwilcox.me.uk/2014/proving-bitcoin-reserves
2551  Bitcoin / Development & Technical Discussion / Re: Algorithm for elliptic curve point compression on: June 28, 2014, 05:46:43 PM
2^256-2^32-x is prime for the following positive x: 263, 359, 361, 487, 739, 949, 977, 1049, 1057, 1339, ...
This explanation doesn't make sense to me: there are larger x, and smaller x. Either it's outright wrong, or not explained very clearly. Can you clarify?
Sorry, the criteria also required that x < 1024, the performance speed-up requires x to be a small integer.
2552  Bitcoin / Development & Technical Discussion / Re: What does murmurhash do in BTC? on: June 28, 2014, 05:37:43 AM
What/why is there murmurhash in the middle of bitcoin?
What does it do, excatly, and why have I never heard of this anywhere? I'm not very proficient with cryptography, so a detailed explanation would be great Wink
It's not used for a cryptographic purpose.

See BIP0037 (or grep the code base for where it is used!).
2553  Bitcoin / Development & Technical Discussion / Re: Algorithm for elliptic curve point compression on: June 28, 2014, 05:30:16 AM
how is this derived?:  p = 2^256 - 2^32 - 2^9 - 2^8 - 2^7 - 2^6 - 2^4 - 1
It's a system parameter, it must be a finite field which has size near 2^256 to achieve ~128 bit security, but less than 2^256 to avoid needing more space, to make the modular reductions faster the number selected is a generalized mersenne number. In the case of secp256k1 was selected by picking the largest x such that 2^256 - 2^32 - x is prime. You can search for "generalized mersenne number" to find the Solinas paper about how fields of sizes with special form yield more efficient computation.
2554  Bitcoin / Development & Technical Discussion / Re: bitcoind-ncurses; Terminal front-end for bitcoind on: June 27, 2014, 11:53:19 PM
Very neat.  Perhaps to go with the bandwidth stats some mempool stats and a time since last received block?— for the latter we might need to adds something to the rpc, I don't think we expose what time we received a block.
2555  Bitcoin / Development & Technical Discussion / Re: Algorithm for elliptic curve point compression on: June 27, 2014, 10:42:17 PM
Its unfortunate— more than anything else patents slayed ecash the first time around... they substantially hamper the deployment of cryptographic tech on the internet, — even when they're not actually applicable getting people to deploy cryptographic technology is uphill enough that the small amount of uncertainty from patents completely tips the balance.

Before getting too worried by DeathAndTaxes reasonable suggestion,— you really shouldn't attempt it without first taking some time to learn about how to read patents, any of that reading should also be read along side RFC 6090 which firmly establishes the unpatentable prior art basis for elliptic curve technology.
2556  Bitcoin / Development & Technical Discussion / Re: Algorithm for elliptic curve point compression on: June 27, 2014, 07:14:09 PM
Quote
Compression of elliptic curve points is patented by Certicom, so you should not use it without the license, generally.
Thats also outrageously incorrect, it's the kind of misinformation repeated by idiots who have no idea how patents works, usually thinking the title of the patent or abstract text specifies what the patent covers (when really the scope is established by the independent claims).

All "compression" means is sending only the X corrd plus one bit of the Y it should hardly be called "compression" as much has omitting redundant data. Smiley

The observation that only the X coordinate was needed was made in the earliest of ECC papers— including, Miller, V., "Use of elliptic curves in cryptography" from 1985: "Finally, it should be remarked, that even though we have phrased everything in terms of points on en elliptic curve, that, for the key exchange protocol (and other uses as one-way functions), the only the x-coordinate needs to be transmitted."

If anyone were to have obtained a patent as broad as that it would be invalid, trivially so due to the Miller cite above and many other prior descriptions of the techniques.
2557  Bitcoin / Wallet software / Re: Looking for an open source online wallet on: June 27, 2014, 01:23:10 PM
not exactly a wallet but still quite nice :http://brainwallet.org/
That site is backdoored, the <random> button bypasses window.crypto and directly uses math.random. Math.random() is typically a 32-bit LCG, practically no entropy at all.
2558  Bitcoin / Development & Technical Discussion / Re: Split block reward to reduce miner variance on: June 27, 2014, 02:45:06 AM
I'm confused again. Im not asking 1 party or pool to come up with 25 solutions meeting condition Y...the idea is that those that do find 1 of the 25 solutions to broadcast them to the network...
Your proposals are not very clear on the technical details. I can interpret what you're saying in multiple ways. If the work you're describing must be cumulative e.g. one building off another to ensure publication than what you're describing is basically what P2Pool already does (though it doesn't impose anything on transaction selection).  If the work is independant but a block must have a total of it, then that isn't progress free— the hypothetical 40% miner could listen to everyone elses announced shares, but horde its own jealously until it finds a block and thus have a significant advantage.

It might help to describe how you think what you're suggesting is different from what P2Pool already does.
2559  Bitcoin / Development & Technical Discussion / Re: I may have overlooked that satoshi spent an additional 25 BTC in 2009. Not sure. on: June 26, 2014, 07:18:03 PM
I have no intentions to learn more about satoshi than we're supposed to,
The best of intentions… but really, thats less of my point than the rest— the sluthing creates an impression that it actually matters, as you can see in TooDumbForBitcoin's response. Thats unfortunate.
2560  Bitcoin / Development & Technical Discussion / Re: Identify a block mined by a p2pool on: June 26, 2014, 06:38:18 PM
Is it possible to recognize a block was mined by a p2pool rather than a centralized pool?
Does the p2pool leave some kind of trace?

If so, maybe something can be done to incentive p2pools.
It is— e.g. you can follow the p2pool sharechain and reconize blocks consistent with it, but the soft (non-hardforking) incentivizaiton approaches require the cooperation of miners.
Pages: « 1 ... 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 [128] 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 ... 288 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!