Bitcoin Forum
November 19, 2024, 07:27:15 AM *
News: Check out the artwork 1Dq created to commemorate this forum's 15th anniversary
 
   Home   Help Search Login Register More  
Pages: « 1 [2]  All
  Print  
Author Topic: DICEonCrack attacked?  (Read 2898 times)
MPOE-PR
Hero Member
*****
Offline Offline

Activity: 756
Merit: 522



View Profile
February 01, 2013, 08:02:41 PM
 #21

Having said that, I think including users inputs in the payments is the only effective way you can protect against (this kind) of double-spend attacks.

MPEx sometimes allows 0conf from users. The rationale is that a double spend wouldn't help the attacker much as whatever missing funds can always be clawed back (say from the person's next withdrawal). So it's not exactly the only effective way, tho it may well be the only effective way in most cases.

My Credentials  | THE BTC Stock Exchange | I have my very own anthology! | Use bitcointa.lk, it's like this one but better.
SRoulette
Sr. Member
****
Offline Offline

Activity: 364
Merit: 252



View Profile WWW
February 04, 2013, 02:24:25 AM
 #22

I would not say that SDice and blockchain wallet "enabled" this attack.

Then you would be mistaken, No one is arguing that it is not a valid use of the blockchain, but it does directly enable the attack as I described.

We have our own method of protecting against double spends without creating chains that are easily double spent.
It has been successful thus far Smiley

Pages: « 1 [2]  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!