3c
₿itcoin
3c719747b27bc71fd9f43df8e21c1dbd332f31fca9110299d7fe89f8d5cc03e5
Helping (-₿itcoin₿-) education sprankled with many opinions: 21^10*6 ₿ with 1^10*8 satoshis. Unstructured simplicity. Best-effort basis monetary propagation. Free and open-source. Cryptography protection. To consensus or not to consensus?
Replying to Avatar freed0m

The website always fails, It always ends in a timeout error for me. Using TOR.

-

Also, I encourage you all to use simpleX as private messenger: this way it is easier to stay private while also hidden from scammers who spam people based on a list of identifiers lik a phonenumber:

there are no phonenumbers etc. And if a spammer gets to your profile without your consent, you can revoke his access and create a new address, which he will not find. I use it daily and it is one of the best in my opinion. Way better than matrix or xmpp.

-

Also, I want to point out to citizenscience projects as a good way to start advanced education. Take for example diy opensource telescopes! or other opensource projects. It is really interesting.

-

Plus, could you guys make an obvious nostr identity? This helps in accesibility from open platforms.

------------

Cheers!

nostr:npub1yfg0d955c2jrj2080ew7pa4xrtj7x7s7umt28wh0zurwmxgpyj9shwv6vg why is the website so slow when accessed trough T.O.R.? Almost all connections end in a timeout.

Tak care of your self, fill the pureness in your body, in your mind. A loss of love, needs you, taking their care to your heart. Champignions are fruitfull mushrooms to take. Take to the sky, to watch the calmness, of the horizon. It is worth it.

Everytime I think about useless second layer applications, #Make-Up tends to surface among the toughts in my mind.

Is it just me?

"In 2024, we will incorporate a marketplace where miners can sell their unrewarded proof of work (PoW) directly to buyers over Lightning for immediately spendable bitcoins. This saves money for the miner in the form of onchain fees (so much so that they may sell at a discount) and permits third-parties to buy bitcoins in exchange for aggregating the unrewarded PoW into fewer UTXOs. The savings made by more efficiently using Bitcoin's blockchain translate into savings for the miner and profit for the liquidity provider."

- ocean.xyz

I don't know when that idea was posted, but it sounds alot like this idea :)

nostr:nevent1qqsq9nfustk8mz2py6khkpsqnqrddy6v79rp67x6jjsya52qa3shcyqpz3mhxue69uhhyetvv9ujumn0wd68ytnzvupzq0r3jarmy778rlvlg00cugwpm0fn9ucle2g3q2va0l5flr2ucql9qvzqqqqqqyupu9t3

Custody will be the new debt in a #Bitcoin world.

#wavlake > "YOU" - Xander Ward

nice song!

But there is something weird going on on the songpage on wavlake that does not happen with any other song:

the instagram links in the profile of the author keep multiplying and expanding the width of the webpage every 0,5 seconds or so, but only if the song is playing. This happens accross brave and firefox. Really weird.

hopefully the nostr:npub1yfg0d955c2jrj2080ew7pa4xrtj7x7s7umt28wh0zurwmxgpyj9shwv6vg team can look into this...

To completely solve it there are some proposals (some requiring consensus) that change the way the channel contract is set up.

also watching nodes and not accepting channels under cerain rules helps migitae this attack.

I am not very very knowledgable in this mater, search also for yourself about this issue.

It is really difficult (potentially costly) to utilize this vulnerability(but maybe not for governments).

migitating this attack can

by rebroadcasting your redeeming transaction many times with higher fee. This forces them to create a new transaction with higher fees.

by looking for certain transactions in order to know as fast as possible if someone is trying to tamper with you.

In the end, it boils down to this:

Alice must be fast to make a "counter offensive" transaction against the attacker, which can never be guaranteed because transactions can always be ignored.

Thus, in order to solve this, time should not play a role in security (in this context). Can we come up with another solution for securing the lightning network?

#asknostr #bitcoin #plebs do you understand the #lightning vulnerability called the #replacement-cycling attack?

TLDR; it is a REAL vulnerability and funds CAN get stolen!

In the lightning network, transactions are send while being abscent on the blockchain: in order to still have security, every channel requires a secret pass from both users, say, Alice and Bob.

To change the balance in the channel, the initiator has to publish the previous secret to create a new one. If Bobs payment is malicious, Alice can use Bobs own past secret against him to retrieve all funds in the channel (stored on-chain and requires on-chain transactions). This has to happen in a short time: a day. Otherwise the attacker can still succeed in stealing all funds. Normally, this is enough to disincentivise hackers from ever trying.

Unless...

And this is where the vulnerability is so critical: it allows hackers to delay Alices transaction, up until it is too late for her to get refunded. They do this by replacing her transaction to get refunded by another "version" with a higher fee, so that Alices transaction gets ignored.

If everyone helps think of a solution, we could maybe solve it.

Gildedpleb.github.io/hab-guide

this is a nice one for noderunner plebs. Really detailed too. About using more hardware to support your node in as many conditions as possible. Linked on bitcoin.org asswell.