Bitcoin Forum
March 19, 2024, 11:18:46 AM *
News: Latest Bitcoin Core release: 26.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 2 [3]  All
  Print  
Author Topic: Fake Bitcoins?  (Read 16597 times)
vector76
Member
**
Offline Offline

Activity: 70
Merit: 18


View Profile
August 23, 2011, 12:14:35 AM
 #41

My understanding is that blocks that are not on the best chain are still relayed, otherwise people will get stuck on the wrong chain.  So even if the block were only sent to the target, the target should have relayed it and the rest of the network should have seen it.  The network does not know which fork will be extended next, so everyone will have to have both.

An "innocent" fork that occurs by pure chance should have the characteristic that all transactions in the abandoned block are included either in the "true" block of the same height, or in the next block.  I think reversing a transaction will require a transaction in an abandoned block to be invalidated in the "true" fork due to a double-spend.  It seems unlikely that such a transaction reversal could happen by accident.
1710847126
Hero Member
*
Offline Offline

Posts: 1710847126

View Profile Personal Message (Offline)

Ignore
1710847126
Reply with quote  #2

1710847126
Report to moderator
You get merit points when someone likes your post enough to give you some. And for every 2 merit points you receive, you can send 1 merit point to someone else!
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
etotheipi
Legendary
*
expert
Offline Offline

Activity: 1428
Merit: 1093


Core Armory Developer


View Profile WWW
August 23, 2011, 12:32:36 AM
 #42

In the case that there are two equal-difficulty-sum chains, the node processes whichever block it received first.  They won't discard the second block, but they won't be trying to extend it if they saw the other one first.   If MBC is behind Tor and the attacker studied the network latencies well, most miners will see the "legit" block first, and that "legit" chain will most definitely get extended first.  (I'm using "legit" here, because I don't know any other way to refer to the non-attacker chain... there is, of course, nothing wrong with the attacker's block except that that chain is unlikely to get extended)

If transactions carry over between from invalidated chains, then the attacker should send himself a small transaction using one of the outputs he used in the huge deposit transaction, to be included in the "legit" block while he waits for it.  By doing this, he guarantees that the large deposit is DOA on the new chain in case the nodes decide to carry it over.  Otherwise, it's possible that the deposit will be transferred to the new chain and the double-spend fails.


Founder and CEO of Armory Technologies, Inc.
Armory Bitcoin Wallet: Bringing cold storage to the average user!
Only use Armory software signed by the Armory Offline Signing Key (0x98832223)

Please donate to the Armory project by clicking here!    (or donate directly via 1QBDLYTDFHHZAABYSKGKPWKLSXZWCCJQBX -- yes, it's a real address!)
Pages: « 1 2 [3]  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!