I think there should be standard format to describe constraints for
BIP32 paths.
I present a BIP draft that specifies "path templates" for BIP32 paths:
https://github.com/dgpv/bip32_template_parse_tplaplus_spec/blob/master/bip-path-templates.mediawiki
Matching against these templates allow to ea
Good morning Tejaswi,
> > So it looks to me that scorched-earth is a possible mitigation against this
> > attack.
>
> I don't follow this. We show that a reasonable value of fees and timelock are
> enough to avoid the attack. Why scorch the earth?
Because your model only considers that a block
As was disclosed today, several wallets have been found not to handle well
the scenario of reverted transactions at zero confirmations. This includes
showing an increased balance to the user without decreasing it when a
transaction is replaced and also preventing the user from being able to
spend o
On Wed, Jul 1, 2020 at 6:58 PM ZmnSCPxj wrote:
> And your paper posits that if a miner is weak, its best strategy is to
> take the myopic strategy and include the currently-valid Alice transaction.
>
Yes. The proof is quite trivial and follows from the definition of weak: if
the myopic miner's h
On Wed, Jul 1, 2020 at 6:58 PM ZmnSCPxj wrote:
> Another analysis, similar but a little off-tangent to yours, would be to
> consider miners as a breeding group with various strategies, and see which
> one is able to gain more utilons (with which it creates more miners) and
> outbreed the other mi