by CrunchyJams on 11/29/13, 1:51 PM with 41 comments
by icebraining on 11/29/13, 2:49 PM
by rdtsc on 11/29/13, 2:50 PM
Maybe just setting up 100 addresses and constantly transferring small payments between them, filling the transaction history with garbage. Is that possible, and is there any protection against that?
by mathretardthrow on 11/29/13, 4:37 PM
* that is, at some future date (or secretly, today) an algorithm could be discovered breaking the one-way function used to generate these hashes. Then a collision could be found, perhaps with chosen-prefix. Meaning an arbitrary file could be suffixed so that it looks as though that is what was hashed today. In the past, many hash algorithms thought to be strong were weakened in this way.
by drakaal on 11/29/13, 3:01 PM
Patient0 mentioned before I got to post this, the other attack I know would work. Destroying tokens. But it is a bit more complex than he mentions, but you can actually generate ECDSA key's that will work for one transaction, and then never again. A one time spend token that then self destructs for the person you paid.
I haven't been able to build anything that would work for two transactions. Which would be the most useful since you'd have a delayed "poison coin" but I don't see any reason it isn't computationally possible.
by notacoward on 11/29/13, 3:07 PM
Given that this seems very similar to el33th4xor's Virtual Notary, how would one distinguish between the strengths or use cases of the two?
http://hackingdistributed.com/2013/06/20/virtual-notary-intr...
by Patient0 on 11/29/13, 2:51 PM
I hadn't realised before that this means that you can provably "destroy" bitcoins. That is, you can "prove" that a certain bitcoin amount will never be spent again by anyone including yourself...
by daviddoran on 11/29/13, 2:38 PM
by Thiz on 11/29/13, 3:13 PM
by JulianMorrison on 11/29/13, 3:38 PM