Hi all,
For those who missed it, the deadline for submissions has been extended
to Sept 9th so be sure to submit before then! We will be doing rolling
acceptance this time around to try to get most responses out before the
23rd.
Because a few folks seemed to have some confusion, the definition of
On Wed, Aug 31, 2016 at 07:48:50PM +, James MacWhyte wrote:
> >
> > >I've always assumed honeypots were meant to look like regular, yet
> > >poorly-secured, assets.
> >
> > Not at all. Most servers have zero reason to have any Bitcoin's accessible
> > via them, so the presence of BTC privkeys i
>
> >I've always assumed honeypots were meant to look like regular, yet
> >poorly-secured, assets.
>
> Not at all. Most servers have zero reason to have any Bitcoin's accessible
> via them, so the presence of BTC privkeys is a gigantic red flag that they
> are part of a honeypot.
>
I was talking a
Hello all,
Today we are submitting some updates to BIP75:
-- Example use cases have been reworded to more accurately describe the
goal of this BIP and how the technology works.
-- ECDSA and PGP have been added to the supported public key infrastructure
(PKI) types to increase flexibility and use
Hello Eric,
I felt like I still owed you a response to the points below.
On Thu, Jun 30, 2016 at 5:10 PM, Eric Voskuil wrote:
> Pieter, these are in my opinion very reasonable positions. I've made some
> observations inline.
>
>> On Jun 30, 2016, at 3:03 PM, Pieter Wuille wrote:
>>
>> On Thu,