Mike Schmidt: Last question from the Stack Exchange is, “What does it mean that the security of 256-bit ECDSA, and therefore Bitcoin keys, is 128 bits? What does it mean that the security of 256-bit ECDSA, and therefore Bitcoin keys, is 128 bits? If I’m understanding the reason behind that, it’s that the reason that sipa points out here, that there are known algorithms that are more effective than just brute-forcing 256-bit keys, so that it’s technically then 128-bit security; am I getting that right? Mark Erhardt: I believe you are getting that right. I’m not doing a great job of explaining this right now, but yes, oftentimes there is a quadratic reduction of the security due to algorithms and what sort of attack model or threat scenario you’re applying, and I think this happens to be the case here. Unlike similar payments with PayPal or credit cards, one could make small donations without a fee, right on the spot, just like throwing a quarter in a jar. However, Bitcoin Core currently monitors for payments to any of its public keys using any of several different address formats. This allows fee bumping a transaction using CPFP and was added for that reason by a developer working on implementing anchor outputs in the Eclair LN node.
So far, the GUI would not indicate if you were using – oh, sorry, could you hear me? Mark Erhardt: I’m sorry, I do not. So yeah, this is not my wheelhouse where I’m an expert. Copy trading allows you to earn benefit from the technical expertise of the expert traders with advanced risk management strategies. Cryptocurrency, also known as crypto-currency or crypto, is a form of currency that exists digitally or virtually in the forex market and uses cryptography to secure transactions of the traders. ” So, Murch, Bitcoin uses 256-bit ECDSA but 256-bit ECDSA only provides 128-bit security. But if you’re trying to replicate a hash by knowing when you know the input message before the hash, the pre-image, then it’s only a 128-bit security because you sort of have to find two things that produce the same digest rather than needing to replicate one digest. So, 바이낸스 2FA you could sort of ask that people route through specific channels because that one is especially lopsided and it would move the liquidity more in the direction that would balance out the channel, which would be a good thing. Mark Erhardt: I think that there might also be a couple of issues here with if you, for example, have one peer that you closely work with and you want to funnel more fees to, you could always route boost them and then make sure that they collect the fees rather than other peers you have, which may be sort of a downside of prioritizing boosted peers.
Because, if you try to replicate a hash, an exact hash, without knowing the input, I think you do have 256-bit security. These bitcoin evangelists have decided to try to persuade the world’s poor to use bitcoin as currency. So, you can run Jade on non-Blockstream hardware, and now with this HWI 2.3.0 release, you can also now use HWI with those DIY devices. So, there actually are a number of different hardware devices that can run the Jade firmware. First one, HWI 2.3.0, which has a few items from the release notes that I think are worth talking about. Mark Erhardt: I think that if you’re just randomly trying to hit a specific thing, that it usually is just the square-root complexity. And if you have information about your peers, channels, liquidity as well, because you’re sharing that somehow, then that will also impact how you build your blinded path. This makes it especially difficult if you’re creating a change output that belongs to you, because the change output, of course, goes to a freshly generated address, and if you’re just seeing money go to a freshly generated address, you do not know whether that’s your address or whether somebody may have tampered with your PSBT and is sending the remainder of your transaction to their own address.
So, what this update does is it indicates which addresses belong to your own wallet, and that makes it especially easier to recognize a change output as such, and hopefully makes PSBTs more accessible in the GUI. The second item from the release notes was the ability to, within the GUI, import and export PSBTs to and from a file. Mark Erhardt: Yeah, so for this one, we have a small update for how PSBTs are shown in the GUI. It’s estimated that only 10% of Crypto Mixer transactions are involved in illegal activities. It’s particularly beneficial when sending your own transactions. But it’s really the recipient’s decision to whether they want to use it or not. Bastien Teinturier: Yeah, and in a way, blinded path will just allow you to do that again because whenever you choose your blinded path, you can choose to make them go through your friend who wants to collect some fees through exactly the channels where you need them, when you know you have a lot of inbound liquidity and want to balance the channel.