01:07:32 | HM_: | Bitcore is a complete, native interface to the Bitcoin network |
01:07:34 | HM_: | Since when is javascript native? :S |
01:15:16 | lnovy: | native as not offloading the heavy liftingb to some other library |
01:17:52 | HM_: | yes, or daemon in this case |
01:20:51 | sipa: | or a website |
01:22:40 | HM_: | which likely just calls the daemon |
01:22:55 | sipa: | which just calls other daemons :p |
01:23:42 | HM_: | turtled |
01:24:27 | sipa: | bingo |
01:24:37 | lnovy: | butcore seems to have this daemon implemented in native node.js :) |
01:25:37 | sipa: | please |
01:27:00 | Emcy: | wut is bitcore |
01:27:56 | lnovy: | library for doing stuff with bitcoin network, wallet files, transactions ect... |
01:28:22 | Emcy: | fuck sake |
01:28:46 | Emcy: | bitcoin just renames to bitcoin core |
01:29:01 | Emcy: | like the nomeclature is not confused enough |
01:29:58 | HM_: | well you should have been more original :P |
01:32:29 | Emcy: | if anything has most claim to be named bitcoins core its the satoshi code |
01:33:28 | HM_: | if it helps any, i think bitcore is a sucky name |
01:33:47 | HM_: | with a hipster tld... pfft .io, come on |
01:34:18 | Emcy: | yeah thats pretty hipster |
02:36:00 | maaku: | error correcting decoder finished : https://gist.github.com/maaku/8996338 |
02:46:02 | andytoshi: | i've proven that an ecdsa malleating fn has to depend on key, there are no key-independent general malleations except the s → -s one that we know of. |
02:46:21 | andytoshi: | obvs this is not enough since the attacker can see the pubkey and use this in his malleation scheme. but maybe it's a start |
02:47:29 | andytoshi: | nice maaku! |
02:47:55 | maaku: | so translation: without pubkey malleation is impossible (except s -> -s), but with pubkey still needs research? |
02:48:41 | maaku: | is that accurate? |
02:49:04 | andytoshi: | yep. |
02:49:25 | Luke-Jr: | reminder: you can infer the pubkey from the signature |
02:49:29 | andytoshi: | and actually the dependence is on privkey, but it's really hard to say with ecdsa that the attacker has no knowledge of the privkey.. |
02:49:35 | andytoshi: | Luke-Jr: yup, i'm aware :) |
02:54:18 | andytoshi: | wait, there's a bug in my argument, i've eliminated far fewer attacks than i thought.. |
02:54:38 | andytoshi: | dammit |
02:54:44 | andytoshi: | maaku can have the spotlight back |
03:20:04 | andytoshi: | nope, i was right. if i can push from this required key-dependence to actually obtaining the privkey (or some non-negligible info about it) i'll have reduced malleating to an actual ecdsa attack |
03:25:08 | gmaxwell: | andytoshi: don't forget that the attacker may have multiple signatures (assume he has a signing oracle) |
03:31:47 | andytoshi: | gmaxwell: yep. if this works with one input sig, it works with an arbitrary number of them. |
09:46:01 | fanquake: | fanquake has left #bitcoin-wizards |
10:30:36 | maaku: | maaku is now known as Guest43188 |
10:31:27 | Guest43188: | Guest43188 is now known as maaku |
11:00:14 | Guest77872: | Guest77872 is now known as pigeons |
11:00:44 | pigeons: | pigeons is now known as Guest37060 |
11:00:59 | Guest37060: | Guest37060 is now known as pigeons |
15:12:27 | tt_away: | tt_away is now known as tacotime_ |
15:57:08 | lnovy: | lnovy is now known as LNOVY |
15:59:03 | LNOVY: | LNOVY is now known as lnovy |
16:04:53 | mike4: | mike4 is now known as c--O-O |
18:57:50 | hno`: | hno` is now known as hno |
21:45:17 | nOgAnOo: | nOgAnOo is now known as Gravy |
21:46:39 | Gravy: | Gravy is now known as nOgAnOo |