> I think cross-input inspection (not cross-input signature aggregation which
> is different) is opening a pandora box in terms of "malicious" off-chain
> contracts than one could design. E.g miners bribing contracts to censor the
> confirmation of time-sensitive lightning channel transactions,
Hi Tom,
Thanks for the explanation. There's one remaining thing that isn't clear:
do you actually require parallel signing requests under the same key. It
seems to me that the protocol is very sequential in that you are passing a
utxo from one point to another in sequence. If so then the Schnorr b
Hi Salvatore,
> This also allows inspection of other inputs, that was not possible with
the original opcodes.
I think cross-input inspection (not cross-input signature aggregation which
is different) is opening a pandora box in terms of "malicious" off-chain
contracts than one could design. E.g m