![](https://bitcointalk.org/Themes/custom1/images/post/xx.gif) |
February 14, 2014, 08:11:25 AM |
|
Most everyone knows by now that the substantive threat from transaction malleability is limited to certain kinds of wallets that are in control of exchanges or other sites that hold assets for registered users. There is some confusion, however, over exactly what to call these wallets, hence there is confusion over how to identify whether a particular asset, held by an exchange, is vulnerable.
I've seen the term "hot storage" used by Defcon, apparently as synonymous with "escrow wallet". I've also seen the term "shared wallet" used.
Are these different? if so, how? Which are vulnerable?
Once we have identified the terminology for vulnerable wallets that are on some exchanges, how do we go about identifying which assets are being held in the vulnerable class of wallets?
Do we then withdraw those assets to private wallets on our own machines for safety (with whatever backup mechanisms are prudent)?
Do we have to get a client for each different type of cryptcurrency that might be in one of these vulnerable wallets?
It is persistence of this kind of confusion that continues to drive BTC prices down.
|