00:10:36 | nairb: | skinnkavaj: what are you suggesting should be done? |
00:11:26 | Luke-Jr: | skinnkavaj knows I'm working on GBT, he's just an impatient guy who thinks everyone should drop everything and get it done overnight |
00:12:09 | nairb: | what's GBT ? |
00:12:39 | nairb: | getblocktemplate? |
00:12:40 | maaku: | nairb: getblocktemplate |
00:12:44 | nairb: | k |
00:12:49 | nairb: | dinner, will read in a bit |
05:55:29 | Pasha: | Pasha is now known as Cory |
07:46:16 | andytoshi: | gmaxwell: hey, regarding 1-of-N outputs, with only one piece of random data we can only get 1-of-2 outputs, because we have only one group operation and the rank-nullity theorem |
07:46:36 | andytoshi: | (try to work it out, you will see that you're just doing linear algebra and have only as much freedom as you have random data) |
07:46:58 | andytoshi: | so to get 1-of-N, you need (N-1) random nonces. i guess you could use blockhash, H(blockhash), H(H(blockhash))... |
07:47:30 | gmaxwell: | Yes, I'd assumed N-1 nonces. |
07:49:50 | gmaxwell: | the requirement I was imagining was not having to transmit or store more than one or two points. |
10:29:57 | skinnkavaj: | Vitalik Buterin on mining centralization |
10:30:09 | skinnkavaj: | And future for Ethereum |
10:30:10 | skinnkavaj: | https://blog.ethereum.org/2014/06/19/mining/ |
10:49:48 | dsnrk: | skinnkavaj: that sounds similar. |
10:50:01 | dsnrk: | s/similar/familiar |
14:04:40 | andytoshi: | gmaxwell: if you have (N-1) nonces R_1, R_2, ..., R_{N-1}, then given pubkeys X_1, X_2, ..., X_N which satisfy X_i - X_{i-1} = R_i, any one of the X_i's imply all the others but only one can be known |
14:05:00 | andytoshi: | this translates to X_1||X_2 and X_2||X_3 and X_3||X_4 ... which collapses to 1-of-N |
14:06:09 | andytoshi: | so generate a random key X_i (with i random), determine X_1 from this, and publish X_1 as the output |
14:26:07 | hearn_: | hearn_ is now known as hearn |
15:16:37 | ZZyZX: | ZZyZX is now known as roidster |
16:32:04 | ghtdak: | ghtdak has left #bitcoin-wizards |
23:05:28 | NikolaiToryzin: | NikolaiToryzin is now known as [REDACTED] |
23:05:40 | [REDACTED]: | [REDACTED] is now known as NikolaiToryzin |
23:31:29 | sl01: | anyone know if linux local privilege escalation vulns usually affect android? e.g. can any random app just use one of the vulns to get root on the phone? |