Bitcoin Forum
February 22, 2018, 01:58:18 PM *
News: Latest stable version of Bitcoin Core: 0.15.1  [Torrent].
   Home   Help Search Donate Login Register  
Pages: « 1 [2]  All
Author Topic: DICEonCrack attacked?  (Read 2762 times)
Hero Member
Offline Offline

Activity: 756
Merit: 500

View Profile
February 01, 2013, 08:02:41 PM

Having said that, I think including users inputs in the payments is the only effective way you can protect against (this kind) of double-spend attacks.

MPEx sometimes allows 0conf from users. The rationale is that a double spend wouldn't help the attacker much as whatever missing funds can always be clawed back (say from the person's next withdrawal). So it's not exactly the only effective way, tho it may well be the only effective way in most cases.

My Credentials  | THE BTC Stock Exchange | I have my very own anthology! | Use, it's like this one but better.
Hero Member
Offline Offline

Posts: 1519307898

View Profile Personal Message (Offline)

Reply with quote  #2

Report to moderator
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction. Advertise here.
Sr. Member
Offline Offline

Activity: 364
Merit: 250

View Profile WWW
February 04, 2013, 02:24:25 AM

I would not say that SDice and blockchain wallet "enabled" this attack.

Then you would be mistaken, No one is arguing that it is not a valid use of the blockchain, but it does directly enable the attack as I described.

We have our own method of protecting against double spends without creating chains that are easily double spent.
It has been successful thus far Smiley

Pages: « 1 [2]  All
Jump to:  

Sponsored by , a Bitcoin-accepting VPN.
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!