Bitcoin Forum
May 08, 2024, 11:43:59 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Warning: One or more bitcointalk.org users have reported that they strongly believe that the creator of this topic is a scammer. (Login to see the detailed trust ratings.) While the bitcointalk.org administration does not verify such claims, you should proceed with extreme caution.
Pages: [1]
  Print  
Author Topic: WTF? 1FYMZEHnszCHKTBdFZ2DLrUuk3dGwYKQxh [bc.i]  (Read 1462 times)
amaclin (OP)
Legendary
*
Offline Offline

Activity: 1260
Merit: 1019


View Profile
December 10, 2014, 10:51:53 PM
Last edit: December 10, 2014, 11:39:50 PM by gmaxwell
 #1

Look to https://blockchain.info/address/1FYMZEHnszCHKTBdFZ2DLrUuk3dGwYKQxh

Do you see outgoing transactions from this address?
They are unconfirmed and can not be confirmed by other nodes
Because 1FYMZEHnszCHKTBdFZ2DLrUuk3dGwYKQxh - is a hash of hex ( "00" )

You can see that scriptSigs do not contain public key, but only OP_FALSE instead of it
In fact this is not OP_FALSE command but OP_PUSH ( 00 )

So, these transactions are invalid. But the attacker can "send" coins from this address to other users of bc.i
And this can create a long chain of never confirmed transactions, because bc.i service allows to spend unconfirmed coins

Does bc.i verify signatures at all?
1715168639
Hero Member
*
Offline Offline

Posts: 1715168639

View Profile Personal Message (Offline)

Ignore
1715168639
Reply with quote  #2

1715168639
Report to moderator
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1715168639
Hero Member
*
Offline Offline

Posts: 1715168639

View Profile Personal Message (Offline)

Ignore
1715168639
Reply with quote  #2

1715168639
Report to moderator
gmaxwell
Staff
Legendary
*
Offline Offline

Activity: 4172
Merit: 8412



View Profile WWW
December 10, 2014, 11:39:16 PM
 #2

::Sigh:: Again?  https://people.xiph.org/~greg/21mbtc.png

Really the limitations of the security model for that kind of wallet only start with the JS substitution/injection attacks. The fact that even if the software is perfect it depends on honest data from the server... You can rob someone just as well by making them think they've been paid when they haven't been as you can by stealing their private keys.
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!