Posts

In what cases is FindAndDelete useful?

In the non-segwit case, FindAndDelete removes signature data from scriptCode. In P2PKH, the signature is not included in the scriptPubKey, so I think the only thing that may actually have signature data removed by FindAndDelete is redeemScript for P2SH. But is there actually a useful use case for including a valid signature within a redeemScript? What was the intention behind introducing the FindAndDelete process? In the following Bitcoin Core's FindAndDelete test case, the public key is recovered from the signature and set to scriptSig. https://github.com/bitcoin/bitcoin/blob/v28.0/src/test/data/tx_valid.json#L496 from Recent Questions - Bitcoin Stack Exchange https://ift.tt/O87x6As via IFTTT

AVA Chow and low quality answers and posts - instawallet software

I assure you with over 20 years experience with microsoft products and the internet having my forst computer in 1998 I know what im talking about when it come to ithe internet and related. I have a 3.7 gpa from a nice high school near a nasa compaund and 20.5 university honors credits from UALr in Little Rock, Ar. I fail to see what is low quality about my questions and posts related to the instawallet software wallet i used on March 1, 2011. To my knowledge the information i gave is true and correct aside from fraudulent claims stating otherwise i see no reason to grade my post as low quality. I challeng the moderator to have a more open view of the early bitcoin era and accept my information as near fact or fact as stated. please treat me with respect as i do have over 20 years experience with the internet and bough my forst bitcoin on march 1, 2011. Please allow me to receive answers and offer any revision suggestions to fit in your webstites guidelines. from Recent Questions - B

Does the reported attack on SPN have any near term consequences for wallet security?

It is reported that an attack on Substitution-Permutation Network (SPN) has been developed with the currently available quantum annealing system from D-wave, as reported in the mostly Chinese paper : The Reg understands the research team, led by Wang Chao from Shanghai University, used a D-Wave machine to attack Substitution-Permutation Network (SPN) structured algorithms that perform a series of mathematical operations to encrypt info. SPN techniques are at the heart of the Advanced Encryption Standard (AES) – one of the most widely used encryption standards. The tech targeted in the attack include the Present and Rectangle algorithms, and the Gift-64 block cipher, and per the Post produced results that the authors presented as “the first time that a real quantum computer has posed a real and substantial threat to multiple full-scale SPN structured algorithms in use today.” Is this a real world practical threat today, or in the near future? Does not reusing addresses protect one

I ended up getting my money for selling something but my bitcoin wallet is locked

I don’t remember even putting a wallet password on my bitcoin core wallet but I cant even make any transactions how do I recover my wallet phrase password from Recent Questions - Bitcoin Stack Exchange https://ift.tt/vl2z4tX via IFTTT

Are IDs, IPs, or onion addresses of nodes with whom there have been issues shared between many different lightning service providers?

Are IDs, IPs, or onion addresses of nodes with whom lightning service providers had issues, e.g. force-closures, shared between many different lightning service providers? I don't mean here simply sharing between various nodes of the same entity but rather sharing between the nodes of separate entities (e.g. between ACINQ and Wallet_of_Satoshi). from Recent Questions - Bitcoin Stack Exchange https://ift.tt/2mp4XQA via IFTTT

Safety from quantum attacks

I recently read that China was able to use quantum computer for cracking military grade encryption. https://thequantuminsider.com/2024/10/11/chinese-scientists-report-using-quantum-computer-to-hack-military-grade-encryption/ The article does admit that the present quantum capability is still in its infancy to affect banks and other services. But let's say that they are able to advance quantum computing to the extent that they can crack into banks and military. How safe is today's blockchain from such future quantum developments? What can be done to secure blockchain from such extreme situations? from Recent Questions - Bitcoin Stack Exchange https://ift.tt/sPeprd6 via IFTTT

How is Blockstream Jade's PIN secure?

I think I understand the purpose of a blind oracle: to not have our encryption key stored in Jade so that an attacker can't perform a physical key extraction by manipulating the hardware. The oracle serves as a form of "secure element" and helps keep Jade fully open-source by being in an external server. We can get the secret key to unlock the wallet using an Elliptic Curve Diffie-Hellman (ECDH) key exchange, which is only available after we set the PIN correctly. However, I don't understand how is the PIN itself secured. Question: Wouldn't the PIN be subject to the type of key extraction the oracle is supposed to protect us from, since it is not stored in a secure element? If yes, sounds like getting the PIN would be just an additional step, but once the attacker has it, he is capable of obtaining the secret key by performing the ECDH himself, which doesn't sound much safer. Can someone explain to me what I'm getting wrong here? Thanks! from Re