Why Nostr? What is Njump?
2023-06-07 15:08:50
in reply to

Ittay [ARCHIVE] on Nostr: šŸ“… Original date posted:2013-11-05 šŸ“ Original message:On Tue, Nov 5, 2013 at ...

šŸ“… Original date posted:2013-11-05
šŸ“ Original message:On Tue, Nov 5, 2013 at 12:14 PM, Peter Todd <pete at petertodd.org> wrote:

> On Tue, Nov 05, 2013 at 12:05:41PM -0500, Peter Todd wrote:
> > On Tue, Nov 05, 2013 at 11:56:53AM -0500, Ittay wrote:
>
> Oh, and I don't want to give the wrong impression: there's no need to
> rush to get this problem fixed. Even if someone wanted to launch an
> attack right now, with a fair amount of resources, there's a lot of
> counter-measures based on human intervention that can definitely stop
> the attack in the short-term


The attack can be easily hidden. And be sure that before today, today,
and after today, very smart people are at their computer planning attacks
on Bitcoin. Exploits must be published and fixed FAST.

Nevertheless, I agree that, as you say, we must not rush it. Look at the
BIP, find if we missed anything, and let's discuss it.


> In addition, keep in mind
> that this attack is very easy to detect, so if one is actually launched
> we will know immediately and can start taking direct counter-measures at
> that time.
>

Not really. Please see the discussion section in our paper.


> That Gregory Maxwell so quickly identified a flaw in this proposed
> solution suggests we should proceed carefully.
>

There is no flaw. You were just reiterating that the solution does not give
us the 51% percent security you thought you had before. We showed that
we're not getting this back, I'm afraid.

Best,
Ittay
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.linuxfoundation.org/pipermail/bitcoin-dev/attachments/20131105/8c0bd106/attachment.html>;
Author Public Key
npub1n8ytpf4jzavm7hl9t5zksuefcguu6k3frvztqqc4kgcdkwduqesq0637cg