Olaoluwa Osuntokun
Olaoluwa Osuntokun
> I particularly need it for my project that I am working on. Is this something that can be completed anytime soon? Or should I find an alternative solution in...
> I just got started on this and would be using this as a rough roadmap. A rather trivial question would be: Where does the files for bip322 go? 😅...
> It does not accept variable length messages, and it does not contain the extra 4 tests added to it that test this capability. Hi correct that this isn't fully...
From the [paper](https://cypherpunks.ca/~iang/pubs/Sphinx_Oakland09.pdf): > Sphinx protects against replay attacks—where the adversary reinjects a previously seen message verbatim—and tagging attacks—where the adversary modifies a message before reinjecting it into the network....
Here's the explicit area the replay protection mechanism is mentioned (Section 3.6): > Compute the shared secret s = αxn . If hτ (s) is already in this node’s table...
> Just want to node that it was discussed in yesterday's spec call that as part of this work we'll probably also want to make option_simple_close transactions (optionally) v3, i.e.,...
> At each block, Mallory buys the whole block space with her batch of 21 sigops overflow txn If we assume Mallory can buy the _entire_ block, then couldn't she...
Possible now via AMP, but not yet manifested on the RPC interface. An easy way to do this, would be to create a new first-class probing API that always attempts...
What we do right now is: * We'll write the ann sig to disk before we send it. * Each time the peer connections, we'll continue to always send it....
> CLN, and others I'm sure, do not queue gossip willy nilly, but rather it gets pulled in at a sustainable rate, such that the head of line blocking does...