Could you spell out the attack explicitly? Presumably there aren't a lot of people with the "malice energy" to perform the attack but not to figure it out for themselves. I, however, have the "niceness energy" to think about it for a few minutes but not to figure it out for myself. If in your opinion it is realistically dangerous to post it publicly, would you be so kind as to include me in the private sharing of the explanation?
By the way, I found a couple of cases of slightly bad handling of merkle trees when I inspected the code (v0.4) that was, I'm 99% sure, not exploitable. I never got around to reporting it yet. I'm sorry about that. My discoveries might interact with the one you're talking about here. I should definitely explain mine to y'all soon. (Possibly in private for the first pass, in case it is more exploitable than I thought, or has become exploitable since v0.4.) I showed it to a couple of other people at the time who helped me make sure that it wasn't exploitable. I'll make time to explain what I found within a week. Regards, Zooko ------------------------------------------------------------------------------ Virtualization & Cloud Management Using Capacity Planning Cloud computing makes use of virtualization - but cloud computing also focuses on allowing computing to be delivered as a service. http://www.accelacomm.com/jaw/sfnl/114/51521223/ _______________________________________________ Bitcoin-development mailing list Bitcoin-development@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/bitcoin-development