James MacWhyte [ARCHIVE] on Nostr: 📅 Original date posted:2021-07-26 📝 Original message:Hi Billy! See above, but ...
📅 Original date posted:2021-07-26
📝 Original message:Hi Billy!
See above, but to break down that situation a bit further, these are the
> two situations I can think of:
>
> 1. The opcode limits user/group A to send the output to user/group B
> 2. The opcode limits user A to send from one address they own to
> another address they own.
>
> I'm trying to think of a good use case for this type of opcode. In these
examples, an attacker who compromises the key for user A can't steal the
money because it can only be sent to user B. So if the attacker wants to
steal the funds, they would need to compromise the keys of both user A and
user B.
But how is that any better than a 2-of-2 multisig? Isn't the end result
exactly the same?
James
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <
http://lists.linuxfoundation.org/pipermail/bitcoin-dev/attachments/20210726/688c8adb/attachment.html>
Published at
2023-06-07 22:57:10Event JSON
{
"id": "9a5c6fa0b36cd110e5a645d2fe71a44db6cf34d9176b3f1398f9d26b8c51e663",
"pubkey": "52e5d0646af3ea5ccb6c4bd31237d6068258a11ace3ac40f02466a3f89342928",
"created_at": 1686178630,
"kind": 1,
"tags": [
[
"e",
"0d3562db57a4816d887a059ade313b36c27060e2a5ce16eb3025779de68863b9",
"",
"root"
],
[
"e",
"4c41a2471eddfb45c9b9639209340adcbca9090f3a8763b18bce478eb919446c",
"",
"reply"
],
[
"p",
"3030ec2d70259fdd55ba8e063740c139c3daaa618f86e3fae34cebcb73c742ba"
]
],
"content": "📅 Original date posted:2021-07-26\n📝 Original message:Hi Billy!\n\nSee above, but to break down that situation a bit further, these are the\n\u003e two situations I can think of:\n\u003e\n\u003e 1. The opcode limits user/group A to send the output to user/group B\n\u003e 2. The opcode limits user A to send from one address they own to\n\u003e another address they own.\n\u003e\n\u003e I'm trying to think of a good use case for this type of opcode. In these\nexamples, an attacker who compromises the key for user A can't steal the\nmoney because it can only be sent to user B. So if the attacker wants to\nsteal the funds, they would need to compromise the keys of both user A and\nuser B.\n\nBut how is that any better than a 2-of-2 multisig? Isn't the end result\nexactly the same?\n\nJames\n-------------- next part --------------\nAn HTML attachment was scrubbed...\nURL: \u003chttp://lists.linuxfoundation.org/pipermail/bitcoin-dev/attachments/20210726/688c8adb/attachment.html\u003e",
"sig": "24f5ee9af63e4b2f6122ece623d3d61b7eb605e9800074f5ef21455be62e51a1bc854ea7c2666bbd76a5affd23448239a773143a568258c0e867a72ef7b214b7"
}