Good morning Luke,
> All attempts are harmful, no matter the intent, in that they waste
> contributors' time that could be better spent on actual development.
>
> However, I do also see the value in studying and improving the review process
> to harden it against such inevitable attacks. The fac
All attempts are harmful, no matter the intent, in that they waste
contributors' time that could be better spent on actual development.
However, I do also see the value in studying and improving the review process
to harden it against such inevitable attacks. The fact that we know the NSA
engag
Wednesday’s second BIP process meeting was announced previously here [0].
A conversation log of the meeting is available here [1].
A summary of the first BIP process meeting is here [2].
The following is a summary of what was discussed.
1) The limits or possible downsides of pursuing maximal de
Jim Posen,
A few years ago you mentioned roastbeef’s proposal of a P2P message to
retrieve all prev-outputs for a given block:
1) Introduce a new P2P message to retrieve all prev-outputs for a given
> block (essentially the undo data in Core), and verify the scripts against
> the block by executi
Good morning everyone,
Just wanted to point out a few things for discussion which may or may not
be obvious:
1) A simple scheme as described by ZmnSCPxj first can lead way for a
standardized process where people can excuse their legitimate attempts to
actually introduce vulnerabilities, where the