pempek19
Jr. Member
Offline
Activity: 98
Merit: 3
|
|
June 08, 2018, 09:45:03 AM |
|
where can I find similar kintes? I want to have a better contribution in this forum and get merit prizes. thanks
|
Word of Mouth Pro │▌ https://wmpro.io ▐│ A Blockchain based Reputation and Rating Ecosystem
|
|
|
JGreg96
|
|
June 09, 2018, 11:12:58 AM |
|
Question: What happens when a transaction is included in more than one block? Don't break the forum rules,and no PLAGIARIZING!
I try to reply because i saw inaccurate answers. We are talking about the same transaction still not confirmed. In this case is possible that miner A and B include this transaction in 2 different blocks (one made by A and the other made by B). Then miner A proposes his block to node i and miner B does the same with node j. In this case there will be other miners which will consider the "previous block hash" that of i and other that of j. So other miners like C,D will mine after A-block and miners F,G will mine after B-block. This story will end as soon as most miners (and therefore the greater quantity of hashing power) will continue the story from i (or j) and the other story will be rejected by nodes, so this is reduced by the common sentence "the longest chain wins". If we are talking about the same transaction but in 2 different period it has no sense because the inputs used in the second transaction (which would be the same of the first) are "empty" because they have already spent so it is necessary changing inputs, changing hash, changing transaction.
|
|
|
|
pugman (OP)
Legendary
Offline
Activity: 2383
Merit: 1551
dogs are cute.
|
|
June 12, 2018, 04:41:11 PM |
|
where can I find similar kintes? I want to have a better contribution in this forum and get merit prizes. thanks
Yeah no. Merit is not a prize, this is NOT a competition. Now tell me why do you want merit? Just to rank up and shitpost for bounties?
Only one of the transactions would be valid in the BTC blockchain. For the transaction to be valid in 2 different blocks it would have to be during a fork of the original chain. After typing this I looked for validation on my theory and came across this https://bitcoin.stackexchange.com/questions/18656/can-a-transaction-be-in-two-blocksAfter reading the response and given when it was written, it looks like other than a fork this would only occur if someone was trying to 51% attack the chain and create a double spend opportunity for themselves. What I did learn and did not know before, or really think about is that, if you include an already confirmed transaction in a found block it will be rejected and you would lose out on the block reward. This brings me to another question if someone feels like learning me some knowledge... If someone did lose a block by including an already confirmed transaction, does the network keep working on that particular block, or do all valid transactions that were included in the block go back to the mempool, and the block reward is lost? The answer to your question is probably the latter. The network would rather focus on the future blocks, and the transactions in the invalid block would go to the future blocks. Although I cannot be a 100% sure.
Its been a while since I visited this thread, here's my question: Question: What is a stealth address? How does it work and how does one use them?
|
|
|
|
vit05
|
|
June 12, 2018, 05:44:07 PM |
|
Question: What is a stealth address? How does it work and how does one use them? It is a way of camouflaging the destination addresses of each transaction using a unique address. You can publish a unique "stealth address" on your website. A blockchain will understand that all unique transactions for that address are different and will not allow a correlation between incoming and outgoing addresses. It does not turn the transaction into something totally anonymous. It would be the same as creating a single address for each transaction. Receiver generates a an address and a private secret and then sends this address to someone who he wants payment from. Sender uses the address and a "nonce" to generate the address he/she can send funds to. Sender communicates the nonce to the receiver and by using this nonce and the secret key generated earlier he/she can unlock the address with the funds.This concept was introduced by the user ByteCoin. https://bitcointalk.org/index.php?topic=5965.0
|
|
|
|
Heisenberg_Hunter
Legendary
Offline
Activity: 1584
Merit: 1280
Heisenberg Design Services
|
|
June 14, 2018, 03:55:12 PM |
|
Question: What is a stealth address? How does it work and how does one use them?
Not many users will be aware of stealth address unless they have completely read everything about bitcoin or they have used Monero or other cryptonote coins. As I have used Monero once, I knew how a stealth address works. Let me try to explain this in simple terms. A stealth address is a type of bitcoin address which is generated by the receiver to receive his funds anonymously. A stealth address generated is used to have a transaction only between the sender and the receiver where the sender cannot view the earlier transactions which were made to the address. A stealth address can be used only once and only for one transaction. The sender sends the coins to the stealth address in the sense that it can only be derived by the receiver using his private keys. Monero uses stealth address technology for its transactions. Basically a stealth address works on the mechanism of Elliptic-Curve Diffie-Hellman algorithm.
How does a stealth address work? For instance, let us consider Bob is the receiver of bitcoin and Alice is the sender. Bob has a private key (X) and a public key (Y) and Alice has a private key (A) and a public key (B). The public key of both sender and receiver are known to each other. Now, Bob creates a secret channel say C, where C= X*B (privkey of Bob * pubkey of Alice) and Alice creates a secret channel similar to Bob, where C= A*Y (privkey of Alice * pubkey of Bob) When Alice pays the funds she hashes the secret channel C and then adds pubkey of Bob and creates a public key or address D where D= Y + H(C) This pubkey which is used by Alice to pay the bitcoin is called as Stealth Address. Bob can spend the coins by the private keys he has and also Bob's wallet need to check the OP_RETURN (B) quite often in order to discover the right address and its balances.
Stealth address are very rarely used by Bitcoin network or people due to the disadvantages associated with it. A stealth address can be generated using Dark Wallet.
|
|
|
|
buwaytress
Legendary
Offline
Activity: 2982
Merit: 3687
Join the world-leading crypto sportsbook NOW!
|
|
June 14, 2018, 04:41:26 PM |
|
Stealth address are very rarely used by Bitcoin network or people due to the disadvantages associated with it. A stealth address can be generated using Dark Wallet.
Not answering, but this question made me look up DW again... and yeah, it's still languishing on GitHub without an update for almost two years now. Samourai, which seems to have active development, appears to implement BIP47 stealth addresses. I would be curious if anyone here has ever used a stealth address with Bitcoin. I haven't. Maybe time to check out Samourai and test this. Still in alpha, though.
|
|
|
|
r1s2g3
Sr. Member
Offline
Activity: 742
Merit: 395
I am alive but in hibernation.
|
|
June 14, 2018, 07:11:38 PM |
|
Question: What is a stealth address? How does it work and how does one use them?
If a business/organization start accepting Crypto currency then business will need to put his public address. But all the transactions on this public address can be tracked. Disadvantage for business, 1. revenue details of business are available to competitors. 2. Competitors are knowing the client wallet id too (if they able to find client associated with that wallet id, they can try to break that client) 3. They can track the suppliers for that business too. What business can do. Business can create a series of public address to be used individually with each client or supplier or it can generate a stealth address . Now when the client send the payment to business in this stealth address, a unique address will be automatically generated and funds will go to address and only sender and receiver determine if payment is complete and no outsider will able to trace back the transaction. So Stealth Address provide anonymity to the sender and receiver address.
|
I am alive
|
|
|
bitmover
Legendary
Offline
Activity: 2478
Merit: 6286
bitcoindata.science
|
|
June 14, 2018, 07:47:15 PM |
|
I am still confused about this stealth address. I can generate a new address for a payment, and then I will have total price on that transaction. If for any reason I want to have privacy over the future transactions of that uotx, I could use a coinmix service. Is there any advantage of using an stealth address over his method? Maybe convenience, if there is an easy client to handle stealth address? +1 merit for pugman, for the best question so far.
|
|
|
|
pugman (OP)
Legendary
Offline
Activity: 2383
Merit: 1551
dogs are cute.
|
|
June 14, 2018, 08:52:19 PM |
|
I am still confused about this stealth address. Is there any advantage of using an stealth address over his method? Maybe convenience, if there is an easy client to handle stealth address?
I usually read stuff like this from bitcoin.stackexchange.com ,and from what I have come across a reply that explains about stealth addresses in brief and a few things I noticed was: - Stealth addresses don't necessarily provide 100% anonymity. - The difference is that stealth address are based on providing unique addresses, other than manually providing different addresses. Read this reply: https://bitcoin.stackexchange.com/a/29648/5757
|
|
|
|
vit05
|
|
June 15, 2018, 05:43:48 AM |
|
I am still confused about this stealth address. Is there any advantage of using an stealth address over his method? Maybe convenience, if there is an easy client to handle stealth address?
I usually read stuff like this from bitcoin.stackexchange.com ,and from what I have come across a reply that explains about stealth addresses in brief and a few things I noticed was: - Stealth addresses don't necessarily provide 100% anonymity. - The difference is that stealth address are based on providing unique addresses, other than manually providing different addresses. Read this reply: https://bitcoin.stackexchange.com/a/29648/5757In the last answer, someone says the concept was introduced by Peter Todd. Some other people usually say that. It was not. As I said before, ByteCoin comes up with the concept. But in his concept, the sender could have the money back because both could compute the private key. CryptoNote paper comes up with a solution to this problem. Amir Taaki suggests address format and some use cases and only them Peter Todd make the introduction paper to Bitcoin.
|
|
|
|
Murphydre
Newbie
Offline
Activity: 84
Merit: 0
|
|
June 15, 2018, 08:47:04 AM |
|
Pls this Q&A still on?cause i will like to join and participate to earn merits! Tanks for the great work here to encourage members.
|
|
|
|
Murphydre
Newbie
Offline
Activity: 84
Merit: 0
|
|
June 15, 2018, 09:19:11 AM |
|
To my own simple understanding of how stealth address work, a stealth address is a way to let someone pay money to somewhere that the receiver can find and have the public and private key for. The payee provided information for the stealth address such that they can determine the public and private key but payer can only determine a public/receive address. The payee didn't specify that exact receive address but can scan a valid range to find it based on a shared secret between payer (sender)and payee(receiver). The mechanism is designed so that only the payee will have the private key of the destination address.
|
|
|
|
Heisenberg_Hunter
Legendary
Offline
Activity: 1584
Merit: 1280
Heisenberg Design Services
|
|
June 15, 2018, 10:28:15 AM Last edit: June 15, 2018, 03:49:00 PM by Heisenberg_Hunter |
|
~snip~
Go and shitpost somewhere! This is not the place for you to prove your plagiarism skills and earn merits. A one liner shitposter who has no knowledge other than bounty hunting came to this thread to beg for merits. Reported you here : https://bitcointalk.org/index.php?topic=1926895.msg40162174#msg40162174Maybe convenience, if there is an easy client to handle stealth address?
Dark Wallet and Samourai has stealth address features. But I am not sure how this will work Stealth address has more disadvantages and it is difficult to use in bitcoin environment.
|
|
|
|
mangodebango
Newbie
Offline
Activity: 54
Merit: 0
|
|
June 18, 2018, 05:46:03 PM |
|
Question: What is a stealth address? How does it work and how does one use them?
The stealth address is a method where additional security can be granted to a user of a cryptocurrency. For example, if someone wanted to receive a number of tokens of a cryptocurrency from a sender as a payment for work, but didn’t want anyone else to know about it, then they could give the sender a stealth address. When the sender sends the funds to the receiver, a random unique address is created where the funds will be shown to have gone on the blockchain. What this means is there is no link between the stealth address and any other transaction address the receiver may have used. This therefore provides a layer of anonymity because no one will be able to see how the receiver spent their received funds.
|
|
|
|
bitmover
Legendary
Offline
Activity: 2478
Merit: 6286
bitcoindata.science
|
Question: What is a stealth address? How does it work and how does one use them?
The stealth address is a method where additional security can be granted to a user of a cryptocurrency. For example, if someone wanted to receive a number of tokens of a cryptocurrency from a sender as a payment for work, but didn’t want anyone else to know about it, then they could give the sender a stealth address. When the sender sends the funds to the receiver, a random unique address is created where the funds will be shown to have gone on the blockchain. What this means is there is no link between the stealth address and any other transaction address the receiver may have used. This therefore provides a layer of anonymity because no one will be able to see how the receiver spent their received funds. Plagiarism from https://www.mycryptopedia.com/everything-need-know-stealth-addresses/Stealth addresses is a method by which additional security can be granted to user of a cryptocurrency. For example, if Alice wanted to receive 5 tokens of a cryptocurrency from Bob as a payment for a job, but didn’t want anyone else to know about it, then she could send Bob a stealth address. When Bob sends the funds to Alice, a random unique address is created where the funds will be shown to have gone on the blockchain. What this means is, there is no link between the stealth address and any other transaction address Alice may have used. Therefore, this provides a layer of anonymity because no one will be able to see how Alice spent her received funds.
|
|
|
|
BitcoinNewbie15
Sr. Member
Offline
Activity: 574
Merit: 296
Bitcoin isn't a bubble. It's the pin!
|
|
June 18, 2018, 07:15:49 PM |
|
Hey guys, I just wanted to say thank you to pugman, billgator, and those that gave genuine answers to the questions they've asked. I haven't participated in this Q&A but I have been following it. I have learned a lot of things from this thread and I think this is a brilliant way of encouraging forum members to learn more about Bitcoin. It's sad to see how many people in this thread have taken advantage of this by attempting to get away with plagiarism just to earn quick merit .
|
|
|
|
AverageGlabella
Legendary
Offline
Activity: 1232
Merit: 1080
|
|
June 20, 2018, 12:12:57 AM |
|
Hey guys, I just wanted to say thank you to pugman, billgator, and those that gave genuine answers to the questions they've asked. I haven't participated in this Q&A but I have been following it. I have learned a lot of things from this thread and I think this is a brilliant way of encouraging forum members to learn more about Bitcoin. It's sad to see how many people in this thread have taken advantage of this by attempting to get away with plagiarism just to earn quick merit . So not only has this thread provided people like you and I with fantastic knowledge but its also led to people who are trying to abuse the system via plagiarism in order to earn merit getting banned. Thats the very definition of 2 birds 1 stone.
|
|
|
|
korkor
Member
Offline
Activity: 115
Merit: 10
|
|
June 20, 2018, 01:38:32 AM |
|
Question: What is a stealth address? How does it work and how does one use them?
Stealth address can be described as a pseudo address generated by a receiver to receive crypto without others tracking the transactions. To some people, it adds extra security since there is no link between the stealth address and any other transaction address they might have used or use. How Stealth Address Works Lets say I want to receive some cryptos anonymously from a friend, i will send my friend the stealth address which i generated. When the cryptos are sent to me, a random unique address (pseudo address) is created indicating that the transaction has gone through the blockchain with no link to other transaction address I may have used. People use stealth address as an additional security in relation to anonymity in crypto businesses.
|
|
|
|
vominhtri1611
Jr. Member
Offline
Activity: 266
Merit: 4
|
|
June 23, 2018, 04:55:24 PM |
|
Question: What is a stealth address? How does it work and how does one use them?
your question is just Bitcoin or both Bitcoin and Altcoins?
|
|
|
|
Sealis
Jr. Member
Offline
Activity: 140
Merit: 2
|
|
June 25, 2018, 02:58:17 PM |
|
Question: What is a stealth address? How does it work and how does one use them? [/quote]
Stealth address is a way of security for the receiving end when a bitcoin transaction occurs. Its kind of like when you are hacking a certain address, you wouldn't really use the same address to hack again since there is a chance you might get caught. The concept of "Security" is not limited to people who really want to perform a transaction properly since Stealth addresses can also be used by people who have malicious ordeals. Stealth addresses are a way to prevent people from easily discovering you, just like how changing your IP address or having an anonymous Ip address can prevent someone from hacking into your computer.
|
|
|
|
|