-of-concept
- Possibly propose BIPs for the different parts.
Looking forward to reading your comments
Regards,
Kalle Rosenbaum
--
Dive into the World of Parallel Programming The Go Parallel Website, sponsored
by Intel
Hi
No I don't agree with the analysis.
Yes, the PaymentRequest can be stored with the same security as the private
keys are stored. The big difference is that the keys never leave the
wallet. As soon as that PaymentRequest leaves the wallet on its way to the
hotel server, it is up for grabs
Actually, the security of the PaymetRequest is pretty much out of your
control as soon as the PaymentRequest is created on the server. You have no
idea what the hotel does with it. Also if it's stored in the hotel server I
have to trust the hotel to keep it safe for me.
Well, yes. But if
experience
worse.
Thank you very much for your comments,
/Kalle
Sent from my iPhone
On 13 Mar 2015, at 19:58, Kalle Rosenbaum ka...@rosenbaum.se wrote:
Hi all,
I've been thinking about how a person can prove that she has made a
payment. I came up with an idea I call Proof of Payment (PoP) and I
Hi Martin,
Thank you very much for your comments. See my answers inline:
Den 23 apr 2015 03:28 skrev Martin Lie mar...@datamagi.no:
Hej, Kalle.
I love the idea of standardised PoPs, including a protocol for
requesting/sending them as an extension of BIP-70.
Me too!
A couple of comments:
Rosenbaum
2015-03-14 19:16 GMT+01:00 Kalle Rosenbaum ka...@rosenbaum.se:
Den 14 mar 2015 00:59 skrev Patrick Mccorry (PGR)
patrick.mcco...@newcastle.ac.uk:
That all seems more complicated than it needs to be - the service you
are paying knows that it had received a payment from some public key Q
of payment differ from just proving
that a given transaction is in a given block (what SPV nodes take as proof
of payment today)?
On Apr 27, 2015 2:42 PM, Kalle Rosenbaum ka...@rosenbaum.se wrote:
Or a really high lock_time, but it would not make it invalid, just
delayed.
Ok, this was a bad idea
Some more use cases might be:
Waiting in comfort:
- Send a payment ahead of time, then wander over and collect the goods
after X confirmations.
Authorized pickup :
- Hot wallet software used by related people could facilitate the use
of 1 of N multisig funds. Any one of the N wallets
Or a really high lock_time, but it would not make it invalid, just
delayed.
Ok, this was a bad idea, since nodes would have to keep it in memory.
Please disregard that idea...
Kalle
Den 27 apr 2015 14:35 skrev Kalle Rosenbaum ka...@rosenbaum.se:
Some more use cases might be:
Waiting
The idea is to simplify implementation. Existing software can be used
as is to sign and validate PoPs. But I do agree that it would be a
cleaner specification if we would make the PoP invalid as a
transaction. I'm open to changes here. I do like the idea to prepend a
constant string. But that
Hi
Following earlier posts on Proof of Payment I'm now proposing the following
BIP for a Proof of Payment URI scheme (To read it formatted instead, go to
https://github.com/kallerosenbaum/poppoc/wiki/btcpop-scheme-BIP).
Regards,
Kalle Rosenbaum
pre
BIP: BIP number
Title: Proof of Payment
Hi
Following earlier posts on Proof of Payment I'm now proposing the following
BIP (To read it formatted instead, go to
https://github.com/kallerosenbaum/poppoc/wiki/Proof-of-Payment-BIP).
Regards,
Kalle Rosenbaum
pre
BIP: BIP number
Title: Proof of Payment
Author: Kalle Rosenbaum ka
) being
honest. It can make a valid pop look invalid, but it cannot make an
invalid pop look valid.
/Kalle
2015-06-16 14:12 GMT+02:00 Kalle Rosenbaum ka...@rosenbaum.se:
2015-06-16 7:26 GMT+02:00 Tom Harding t...@thinlink.com:
Kalle goes to some trouble to describe how merchants need to ensure
Thank you for the clarification Tom!
/Kalle
2015-06-16 16:05 GMT+02:00 Tom Harding t...@thinlink.com:
On 6/16/2015 5:12 AM, Kalle Rosenbaum wrote:
2015-06-16 7:26 GMT+02:00 Tom Harding t...@thinlink.com:
Kalle goes to some trouble to describe how merchants need to ensure that
they only
token can be used over and over. In the case of PoP it's only
usable once, and it's only created when it's actually needed,
minimizing the window of opportunity for the thief.
Regards,
Kalle
On Jun 16, 2015 9:41 PM, Kalle Rosenbaum ka...@rosenbaum.se wrote:
2015-06-16 21:25 GMT+02:00 Pieter Wuille
. It provides little value as the receiver of
a PoP expects a PoP. (Again, thanks Martin Lie for making me think about
this.)
Regards,
Kalle Rosenbaum
--
One dashboard for servers and applications across Physical-Virtual-Cloud
16 matches
Mail list logo